Honey Pots

Read Complete Research Material

HONEY POTS

Honey Pots - A Method of Entrapment



Honey Pots - A Method of Entrapment

Introduction

A process that every company should do is a Ethical Hacking (Ethical Hacking) periodically in order to establish how they are protected against a malicious attack. A very important point that today's companies are not seriously considering is the spread of malicious software, and are living in a complete misinformation. For organizations that use mainly as a main weapon antivirus to detect and remove malicious software, creating a false protection. The reality is that there are hundreds of thousands of malicious software (viruses, worms, Trojans, etc.). That are not detected by antivirus products. Currently the malware using advanced techniques that hide and update causing companies do not perceive that their computers are infected with malicious code. To address this huge gap in security is important to conduct regular malware discarded computer equipment manually and analyzed by trained personnel.

Discussion

An important fact is never financial transactions from an Internet booth (café), and only do it from a computer is properly protected. Regarding the USB is now one of the most widely used storage media, should not be the only means for storing information, and to keep important documents in USB, could lose all your information. It is also important to perform on a regular backup of our most important information. With regard to companies there are various software and hardware commonly used are the Antivirus, Firewall, Web Reputation, IDS, IPS, DLP, etc.. But all this is relegated if the organization's staff does not know the dangers they are exposed, this is important training for all staff of the company. Establish computer security policies and monitor that these are covered adequately.

Computer forensics enables the resolution of conflicts related technological information security and data protection (Maras, 2012). With it, companies get an answer to problems of privacy, unfair competition, fraud, theft of confidential information and/ or industrial espionage arisen through misuse of information technologies. Through its procedures are identified, say, extract, analyze and present evidence generated and stored electronically in order to be accepted in legal proceedings. The increased use of electronic means to store personal information, carry out procedures or banking, has led to increase fraud and online threats, Ruben Aquino said Luna, deputy director of Information Security in the Department of Academic Computing Services (Kruse & Heiser, 2001). The specialist in this house of studies indicated that the computer forensic assistance to investigate threats, fraud or data theft. Today, he said, can be detected blackmail in social networks but it is necessary that users do not fall into deception when reading emails or surfing the Internet, because not everything that is published in this way is true.

Do not forget that the purpose of forensic techniques applied to digital media, is simply to contribute to arrest and prosecute the perpetrators of a crime and have the appropriate evidence for the prosecution resulting in conviction, or, otherwise, exonerate the innocent. A suitable definition might be The preservation, retrieval and analysis ...