scholarly journals Honeypots: Basic Concepts Classification and Educational Use as Resources in Information Security Education and Courses

10.28945/3186 ◽  
2008 ◽  
Author(s):  
Miguel Hernandez y Lopez ◽  
Carlos Francisco Lerma Reséndez

This paper deals with the basic aspects of Honeypots, their use in modem computer networks and their implementation in educational environments. Initially, the implementation of Honeypots solves a common problem of Information Security and Forensics: The dissection of the elements that make up an attack against a computer system. Next, the paper explains the different types and functions of Honeypots once they are implemented in a network in order to make a distinction in terms of what is needed for the Honeypot to do. Finally, the use of Honeypots in educational environments, its benefits and the use of virtualization technologies is discussed.

Author(s):  
Miguel Jose Hernandez y Lopez ◽  
Carlos Francisco Lerma Resendez

This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and implementation in educational environments, providing the reader with the most important points regarding the main characteristics of Honeypots and Honeynets. Honeypots are defined as “closely monitored network decoys” that can be set by network administrators to deal with a wide variety of attacks and interact with users in different levels (Provos, 2004). The implementation of Honeypots provides an answer to a common question posted by the field of information security and forensics: How to dissect the elements that make up an attack against a computer system. The chapter will summarizes the different features and capabilities of Honeypots once they are set up in a production environment to clarify the elements that are needed to be configured in order for a Honeypot to accomplish its main tasks and in order for it to be considered an effective tool. The end of the chapter will shift towards the analysis of virtualization as an important tool that maximizes the practical use of Honeypots in controlled environments that are focused towards the study of attacks, responses and analysis methods.


2021 ◽  
Vol 8 (3A) ◽  
Author(s):  
RODRIGO CARNEIRO CURZIO ◽  
JOAO CLAUDIO BATISTA FIEL ◽  
BRUNO DA SILVA MOURA ◽  
WALINTON EVANGELISTA DE SOUSA ◽  
LUAN JARDIM BONFIM

This paper presents a study on the implementation of nuclear security’s knowledge in the brazilian reality, sharing the promotion of nuclear security education, aligned to guidelines and orientations of the IAEA, and covering fields such as The Regulatory Area and The Non- Regulatory Area. The study takes into account the acts of terrorism that indicate the use or threat of use of radioactive material, radiological weapons or even nuclear weapons, including local attacks where such materials are present. The Nuclear Security planning in a country includes everything. From planning a safety project from a core of a nuclear reactor to planning a gym's safety. It also includes physical security plan, safeguards plan, information security, the society's alert about any risk and actions to prevent and detect the different types of threats, such as the risk of sabotage, illegal transfer of radioactive material, among others.


2021 ◽  
pp. 1-13
Author(s):  
Fernando Rebollar ◽  
Rocío Aldeco-Perez ◽  
Marco A. Ramos

The general population increasingly uses digital services, meaning services which are delivered over the internet or an electronic network, and events such as pandemics have accelerated the need of using new digital services. Governments have also increased their number of digital services, however, these digital services still lack of sufficient information security, particularly integrity. Blockchain uses cryptographic techniques that allow decentralization and increase the integrity of the information it handles, but it still has disadvantages in terms of efficiency, making it incapable of implementing some digital services where a high rate of transactions are required. In order to increase its efficient, a multi-layer proposal based on blockchain is presented. It has four layers, where each layer specializes in a different type of information and uses properties of public blockchain and private blockchain. An statistical analysis is performed and the proposal is modeled showing that it maintains and even increases the integrity of the information while preserving the efficiency of transactions. Besides, the proposal can be flexible and adapt to different types of digital services. It also considers that voluntary nodes participate in the decentralization of information making it more secure, verifiable, transparent and reliable.


InterConf ◽  
2021 ◽  
pp. 333-346
Author(s):  
Andriy Аrtikula ◽  
Dmytro Britov ◽  
Volodymyr Dzhus ◽  
Borys Haibadulov ◽  
Anastasiia Haibadulova ◽  
...  

Modern wide development of science and technology causes the growth of information needs in all branches of human development. At present, there are all opportunities to increase information security by combining sources of information into a single system. At the same time, when merging, specific difficulties and features emerge, which together make it difficult to implement the proposed solutions. The paper considers the peculiarity of combining different types of radar stations into a single information system. Errors of measurements of separate parameters and their influence on system characteristics are considered. Options for solving the problems that have arisen are proposed.


Author(s):  
Suchinthi Fernando

This chapter discusses the importance of information security education for everyone, ranging from organizations to professionals and students, all the way through to individual users of information and communication systems. It discusses the different subject areas in information security and shows how instead of being intimidated by it, different categories of users can obtain varying depths of information security education based on their cyber-activities and need for knowledge. Information security professionals would require an in-depth knowledge in all aspects of information security, and information technology professionals and students would require an overall education in these areas, while most users of information and communication systems would only require a basic education to help protect their information assets in cyberspace.


Author(s):  
Syed Irfan Nabi ◽  
Ghmlas Saleh Al-Ghmlas ◽  
Khaled Alghathbar

This chapter explores enterprise information security policies, standards, and procedures. It examines the existing resources, analyses the available options, and offers recommendations to the CIOs and other people that have to make decisions about policies, standards, and procedures to ensure information security in their enterprise. Additionally, the need, requirements, and audience for different types of security documents are scrutinized. Their mutual relationship is examined, and the association among them is illustrated with a diagram supplemented by an example to bring about better comprehension of these documents. It is important to know the sources and organizations that make standards and guidelines. Therefore, the major ones are discussed. This research involved finding all of the relevant documents and analyzing the reasons for the ever-increasing number of newer ones and the revisions of the existing ones. Various well-known and established international, as well as national, information security standards and guidelines are listed to provide a pertinent collection from which to choose. The distinguishing factors and common attributes are researched to make it easier to classify these documents. Finally, the crux of the chapter involves recommending appropriate information security standards and guidelines based on the sector to which an organization belongs. An analysis of the role played by these standards and guidelines in the effectiveness of information security is also discussed, along with some caveats. It is important for practitioners and researchers to know what is available, who the key players are, and the potential issues with information security standards and guidelines; they are all concisely presented in this chapter.


Sign in / Sign up

Export Citation Format

Share Document