Design and implementation of Network Security Using Honeypot (Record no. 5970)

000 -LEADER
fixed length control field 01943nam a22001457a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210802b ||||| |||| 00| 0 eng d
100 ## - MAIN ENTRY--AUTHOR
Author KOLAWOLE, AYANFEOLUWA EMMANUEL
245 ## - TITLE STATEMENT
Title Design and implementation of Network Security Using Honeypot
250 ## - SUPERVISOR
Supervisor Dr. I.O AKINYEMI
260 ## - IMPRINT
Place of publication Ibafo
Department (College) Computer Science and Mathematics
Date of publication 2019
300 ## - COLLATION
Pagination viii; 38
Other physical details dia, tables
520 ## - SUMMARY, ETC.
Summary, etc Day by day, more and more people are using internet all over the world. It is becoming a part of<br/>everyone’s life. People are checking their e-mails, surfing over internet, purchasing goods, playing<br/>online games, paying bills on the internet etc. However, while performing all these things, how many<br/>people know about security? Do they know the risk of being attacked, infecting by malicious software?<br/>Even some of the malicious software are spreading over network to create more threats by users. How<br/>many users are aware of that their computer may be used as zombie computers to target other victim<br/>systems? As technology is growing rapidly, newer attacks are appearing. Security is a key point to get<br/>over all these problems. In this thesis, we will make a real life scenario, using honeypots.<br/>Honeypot is a well-designed system that attracts hackers into it. By luring the hacker into the system,<br/>it is possible to monitor the processes that are started and running on the system by hacker. In other<br/>words, honeypot is a trap machine which looks like a real system in order to attract the attacker. The<br/>aim of the honeypot is analyzing, understanding, watching and tracking hacker’s behaviors in order to<br/>create more secure systems. Honeypot is great way to improve network security administrators’<br/>knowledge and learn how to get information from a victim system using forensic tools. Honeypot is<br/>also very useful for future threats to keep track of new technology attacks.<br/>
650 ## - TRACINGS
Main Subject Computer Science
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Item type Students Thesis
Holdings
Source of classification or shelving scheme Not for loan Permanent location Current location Shelving location Date acquired Accen. No. Koha item type
    Main Library Main Library Reference 02.08.2021 15010301013 Reference

Powered by Koha