CIS 552 Week 8 Discussion Botnet Defense
Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense.
- As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find.
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.
Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense.
- As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find.
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.
Botnets remain a challenge for Infosec Professionals, with millions spent annually on defense.
- As a security director, explain whether or not you would consider implementing a honeypot as a security control and why. Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer. From the e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand that ISPs take more of a proactive approach in detecting and protecting against botnets. Provide a rationale with your response. Share a website or resource that shows how to setup a honeypot server. Share with your classmates, and include links to any useful resource you find.
After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.