Incident Response Policy

Improved Essays
At the first, let’s make a brief conclusion for the honeypot. Honeypot has several advantages can be used to improve traditional incident response policy:
1.Honeypot only collects high value data. Other security tools tend to provide gigabytes of data which needs user to find the critical data in the ocean. (Spitzner, Lance. Nov 03, 2010). Honeypot solves this problem by giving more accurate information within a clearer format. Beside, honeypot can access to the attack closely, therefore, the false negative rate and false positive rate of collection data are much lower than other monitor tools. (Spitzner, Lance. Nov 03, 2010). The data collection ability is the best weapon of honeypot.
2. Unlike most intrusion detection systems need the signature matching skill to identify the attack which can detect known attacks only. Honeypot is luring attack and collecting the signature of it. Honeypot combines the activities analyzer and the content capture mechanism together to identify the attacker. (Döring, Christian. July 01, 2005). Thus,
…show more content…
Since traditional incident response policy takes effect only if the incident has happened, the detection ability is a big weakness of it. Some incident response policies choose Intrusion Detection Systems (IDS) as a solution designed for detection. However, IDS may be overwhelmed by massive network events. Also, IDS does not suitable for the system which uses Wild Area Network (WAN). Honeypot is the active protection tools, all the connections access to the honeypot are suspected by nature. When the connection is created, the honeypot will stand the connection as an unauthorized activity. (Riden, Jamie. Nov 07, 2006). The honeypot will record the signature of this action, perform content analysis and monitor its action continually. In this way, honeypots provide the strong detection function with reducing false positives and false

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    It is one of the key features to test penetration included in Kali. Furthermore, Kali includes Armitage, which is a Metasploit tool which allows a team to share sessions, hosts, event logs and most importantly share access to their exploited hosts. Bots, which can be written using a language called Cortana, can also be utilized to further assist in exploitation using Armitage. Armitage will also check and see which exploits are viable and effective on your targeted machine. Once the initial exploitation is completed, you will be able to perform greater degrees of exploitation such as logging keystrokes and accessing the file system.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Citadel botnet is very similar to Zeus botnet. It is designed to steal personal information used in financial transactions and perform DDoS attacks. Alexa benign traffic includes domain name lists which are used to avoid the possibility of representing old botnet behavior when old binaries are used. The dataset from the Centro University, Argentina…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The ability for agencies within the Intelligence Community to share information horizontally through the use of Fusion Centers has proven both effective and beneficial to Americans everywhere. In only the last five years, Fusion Centers have been credited with “preventing, protecting against, and responding to criminal and terrorist threats,” (DHS 2015) all across the country. Although they assist with the counter-terrorism fight, it is important to identify that that is not their primary mission. The primary mission of Fusion Centers is to “receive, analyze, gather, produce, and disseminate a broad array of threat-related information and actionable intelligence to appropriate law enforcement and homeland security agencies” (DHS 2015).…

    • 155 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Monitoring solutions can be used to monitor all kinds of information on the network including. According to http://www.opsview.com/why-opsview the features of opsview include being able to see the entire connected device on the network and what resources they are taking. Viewing different devices can give the system administrator more information about the status of the network. This is important because it allows the system administrator to have an up to the minute view of the overall health of the network and inspect and fix any part that is damaging the system. Having good monitoring can help prevent downtime and decrease the response time in intrusion detection.…

    • 604 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Do You Know? EVERY 24 SECONDS A host accesses a malicious website EVERY 1 MINUTE A bot communicates with its command and control center…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Joy, There are several way that best evidence rule applies to cyberterrorism threat. First, the Department efforts to prevent terrorism are centered on a risk-based layered, approach to security in our passenger and cargo transportation systems and at our borders and ports of entry (DHS, 2015). The best evidence rule can be used to detect explosives and other weapons, help protecting critical infrastructure and cyber networks from attack, and building information sharing partnerships. Also, enhanced bio readiness and situational awareness by sharing public health and intelligence information with state and local partners through local fusion centers. The intelligence analysts and biodefense experts at the National Biological Threat Characterization…

    • 235 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    This will allow the police to create a solution that can help prevent some of these burglaries. Through an intelligence-led strategy, the police might even be able to identify who are the criminals who are committing these crimes and apprehend them, thus the high rate of burglaries will…

    • 215 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Emergency Managers can train the community in how to alert the proper authorities or implement a local alert system. A system of easily reporting suspicious activity (phone/internet) must be implemented on a local level that can easily initiate a nationwide suspicious activity alert based on key words. These key words such names, addresses, purchases should flag agencies involved in investigating these activities not just at the local level but the state and federal level as well. Information sharing amongst agencies quickly and efficiently is a key aspect in detecting possible terrorist attacks (Lynch, 2016). Detection is only one element of an Emergency Manager’s…

    • 786 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Our recommendation to the National Security Council is to pursue Policy #4, using a honeynet to trap attackers and provide attribution. This technical solution is far more covert than our other alternative policies. It allows us to obtain knowledge about hackers’ methods and means of attack during their attempts to infiltrating sensitive data. Most importantly, it could potentially provide irrefutable evidence for attribution. This evidence enables the US to impose harsher sanctions without fear of a backlash.…

    • 381 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    SANS (Sysadmin, Audit, Network and Security) Institute is a privatized company by the United States, which is specialized in 400 training courses including cybersecurity training and information security for security professionals providing proper certification. SANS was established in 1989. The SANS 11 supported programs in the security program publication of 2003 “The many facets of an information security program” by Robert L Behm Jr. Will be discussed below. The information security program is a task for the ISSO.…

    • 935 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    The National Response Framework and National Incident Management System ensures that all partners comprehends their working responsibilities and roles and thus provides a framework in dealing with any domestic incidents as quick as possible. This always leads to these national departments to mitigate any incident whether in the initial phase or in the rapid growing threat of incidents. They fosters’ adequate responsibility at all levels of government since they implement flexibility and scalability features in dealing with response at any time(Koenig, 2009). They also strive in coordination with state, federal, local and tribal partners in helping the save the lives of America’s communities.…

    • 144 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Use the internet to gain knowledge and not an easy way out and the tool becomes an invaluable asset to your everyday life. To finish, the internet is helpful to all its users –if used correctly-- and can allow the data hunter to concentrate on the important information, and leave out the…

    • 1218 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Hacking In Healthcare

    • 1225 Words
    • 5 Pages

    Introduction Hacking the Healthcare System Healthcare has the highest cyber-attacks in the industry. This is only growing. Nearly half of all health care organizations have reported criminal attacks that caused a breach in their systems (Goodman, 2015). These hackers are gaining access to the electronic health information. Identification, banking information, and pharmacies used are just some of the data that these online hackers are getting their hands on.…

    • 1225 Words
    • 5 Pages
    Great Essays