HONEYPOT SYSTEMS

DSpace Repository

Show simple item record

dc.contributor.author Troshani, Deni
dc.date.accessioned 2025-01-24T09:30:45Z
dc.date.available 2025-01-24T09:30:45Z
dc.date.issued 2021-07-28
dc.identifier.uri http://dspace.epoka.edu.al/handle/1/2420
dc.description.abstract Every day, more and more people all over the world use the Internet. It is becoming a part of everyone's life. People check emails, go online, buy products, play games online, pay bills online, and so on. However, in the process of accomplishing all these things, how many people know about safety? Are you aware of the risks of malware attacks and infections? Some malicious programs have even spread across the Internet, posing further threats to users. How many users know that their computer can be used as an intermediary against other systems? As with rapidly evolving technology, new attacks are constantly emerging. Safety is the key to solving all these problems. In this article, we will introduce how to improve security by using honeypots.Honeypot is a system that attracts hackers into it. By luring the hacker into the system, it is easly to verify all the actions that are being taken from the hacker. In other words, the honeypot is a booby trap, which looks like a realistic system to lure attackers. The goal of a honeypot is to analyze, understand, monitor, and track the behavior of hackers to create a more secure system. Honeypot is an extraordinary method to find out about the system security managers and to figure out how to get data from a casualty framework. Honeypots are also very useful for tracking future threats from new technology attacks. en_US
dc.language.iso en en_US
dc.subject Honeypot, hacking, security, honeypot legal analysis, network en_US
dc.title HONEYPOT SYSTEMS en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account