dc.rights.license | All rights reserved | en_US |
dc.contributor.advisor | Duffany, Jeffrey | |
dc.contributor.author | Concepción Rivera, Héctor D. | |
dc.date.accessioned | 2020-09-16T17:41:37Z | |
dc.date.available | 2020-09-16T17:41:37Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | Concepción Rivera, H. D. (2015). Portable HoneyPot & HoneyNet: within a closed network [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/629 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico | en_US |
dc.description.abstract | At any given time a business network
could be or has been compromised by a hacker or
its information been exposed or breach. This is why
building a honeypot and understanding how to use
it can help network security expert, avoid being
hack in the first or try to mitigate those attacks and
breach. It also shows that this tools can be used for
research purpose in a local home network for test
and research. This paper will explain what
honeypots and honeynets are, and the help of
building one in a Microsoft environment using low
cost tools and hardware and being portable.
Key Terms - Hackers, Honeynets, Honeypots,
Packets. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Computer Science; | |
dc.relation.ispartofseries | Winter-2015; | |
dc.relation.haspart | San Juan | en_US |
dc.subject.lcsh | Computer security | |
dc.subject.lcsh | Hackers | |
dc.subject.lcsh | Computer networks--Security measures | |
dc.subject.lcsh | Hacking--Prevention | |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | Portable HoneyPot & HoneyNet: Within a Closed Network | en_US |
dc.type | Article | en_US |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |