Saturday, 24 February 2018

CIS 552 Week 8 Discussion Botnet Defense

CIS 552 Week 8 Discussion Botnet Defense




Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense. 
  • As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find. 
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.





















Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense. 
  • As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find. 
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.


Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense. 
  • As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find. 
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...