Could you please help with the question below please and thank you i need it as detailed as possible
Info:
Honeytokens - Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or
- Helps to track whether information is being stolen or not.
- For example, hospital security will make fake accounts on the medical data of individuals for example, and if someone accesses that account, it means the system has been compromised.
More info:
SECTION 3.
Honeytokens
Lance Spitzner, the leader of the Honeynet Project, has defined the term honeytoken as “a digital or information system resource whose value lies in the unauthorized use of that resource” [5]. Honeytokens can be any digital data. They can consist of documents, images, or even data such as a phony login/password combination. A honeytoken may be any data on a system for which accesses can be logged, and whose access automatically implies unauthorized activity.
While the term ‘honeytoken’ is new, the concept is not. The term ‘honeytoken’ was created by Augusto Paes de Barros on February 21, 2003. He used it in a e-mail that went to a list of security professionals.6 Spitzner further mentions that some map makers will insert phony roads or cities on their maps. They do this so that they can prove when competitors sell copies of their maps. Spitzner gives other hypothetical examples of honeytokens in use. One such example shows how a honeytoken could possibly help in
The key to using honeytokens is to give the token unique identifiable elements to guarantee that the only access to that token would be by unauthorized parties. If the token could be viewed in normal interaction with a system, the token's tracking ability is compromised. Honeytokens' greatest advantage lies in their flexibility and their minimal cost.
Question:
a) A Deeper Look at Honeytokens (How are they used? Who uses them? Examples, etc.)
b)Honeytokens Benefits and Downfalls
c)Honeytokens Case(s)
Here have to determine about Honeytokens problem statement.
Step by stepSolved in 2 steps
- Explain data tampering, forgeries, and web jacking with an example.arrow_forwardDefine data diddling, forgeries, and web jacking using an example.arrow_forwardSeparating files of one user from another = is user’s permissions Making data secure and hard to read by unauthorised users = is Encryption Detecting malicious files received from the Internet = is Anti-Virus Blocking unwanted traffic trying to access a network = is Firewall List the names, purposes and characteristics of a range of security techniques. You have now talked more about the purpose. However, you still need to talk about the more technical details of each security technique that you have identified (standard and admin accounts, BitLocker encryption, anti-virus, firewall). Justify the use of a range of security techniques in typical situations. It may help to consider what would happen without the security mechanisms and go from there.arrow_forward
- Give examples of information not covered by the Security Rule.arrow_forwardBook title: Cybersecurity Essentials - Charles J. BrooksChapter 1 - Infrastructure security in the Real world From the information provided in the first scenario, consider the National Institute of Standards and Technology (NIST) functions detailed in this section and observe how they relate to each category. 1. Which steps could be put in place to recover from actions intended to access, disable, degrade, or destroy the assets that has been previously identified (NIST RC.RP-1)? (Refer to screenshot for reference)arrow_forwardPlease response to the following: This is for a Digital Forensics Course I appreciate any assistance with this question/problem thank you kindly. See Below Question: In the context of FTK (Forensic Toolkit), what is the Markov characters referred to when password cracking? (Hint Provided: Look first at PRTK (AccessData: Password Recovery Toolkit and Distributed Network Attack Manual).arrow_forward
- Explain "cybercrime." Give three internet offenses with examples.arrow_forwardDescribe the risks and vulnerabilities associated with encryption and the importance of keeping encryption software up to date.arrow_forwardWhich is Better: Unitaskers or Multitaskers? In the field of cyber forensics, many tools have a specific emphasis, purpose, or job, while other programmes can do almost every task. --Please provide an example and indicate if it is a unitasker or a multitasking activity. -Give your opinion on whether it is advantageous, disadvantageous, or irrelevant to be a uni or a multi.arrow_forward
- Find out which of the suggested best practises for data protection should be put into place. (Privacy in the digital world and encrypting data)arrow_forwardDescribe the security techniques used for the following situations and justify their uses: a) Separating files of one user from another b) Making data secure and hard to read by unauthorised users c) Detecting malicious files received from the Internet d) Blocking unwanted traffic trying to access a network criteria List the names, purposes and characteristics of a range of security techniques. Justify the use of a range of security techniques in typical situations. note just listing isn’t enough. We need to know the purpose and technical details of each security technique no handwriting pleasearrow_forwardCan you please revise this? Security: Summary: Security is paramount in the banking/financial sector due to the sensitive nature of financial transactions and customer data. It involves measures such as encryption, authentication, firewalls, intrusion detection/prevention systems, and VPNs. Reasoning: I selected security as a critical attribute for the banking/financial sector because it deals with valuable assets and confidential information. For instance, online banking transactions and credit card payments involve the exchange of sensitive data such as account numbers and personal identification information. Without robust security measures in place, the risk of fraud, identity theft, and financial loss significantly increases. Implementing strong security protocols helps mitigate these risks and enhances customer trust and confidence in financial institutions. Reliability: Summary: Reliability refers to the ability of the network to consistently deliver services and maintain…arrow_forward
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY