Mostrar el registro sencillo del ítem

dc.rights.licenseAll rights reserveden_US
dc.contributor.advisorDuffany, Jeffrey
dc.contributor.authorConcepción Rivera, Héctor D.
dc.date.accessioned2020-09-16T17:41:37Z
dc.date.available2020-09-16T17:41:37Z
dc.date.issued2015
dc.identifier.citationConcepción Rivera, H. D. (2015). Portable HoneyPot & HoneyNet: within a closed network [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico.en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12475/629
dc.descriptionDesign Project Article for the Graduate Programs at Polytechnic University of Puerto Ricoen_US
dc.description.abstractAt any given time a business network could be or has been compromised by a hacker or its information been exposed or breach. This is why building a honeypot and understanding how to use it can help network security expert, avoid being hack in the first or try to mitigate those attacks and breach. It also shows that this tools can be used for research purpose in a local home network for test and research. This paper will explain what honeypots and honeynets are, and the help of building one in a Microsoft environment using low cost tools and hardware and being portable. Key Terms - Hackers, Honeynets, Honeypots, Packets.en_US
dc.language.isoen_USen_US
dc.publisherPolytechnic University of Puerto Ricoen_US
dc.relation.ispartofComputer Science;
dc.relation.ispartofseriesWinter-2015;
dc.relation.haspartSan Juanen_US
dc.subject.lcshComputer security
dc.subject.lcshHackers
dc.subject.lcshComputer networks--Security measures
dc.subject.lcshHacking--Prevention
dc.subject.lcshPolytechnic University of Puerto Rico--Graduate students--Research
dc.titlePortable HoneyPot & HoneyNet: Within a Closed Networken_US
dc.typeArticleen_US
dc.rights.holderPolytechnic University of Puerto Rico, Graduate Schoolen_US


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem