logo

Essay on Deception Techniques Using Honeypots

   

Added on  2020-07-23

12 Pages3288 Words43 Views
LEGALASPECTS

Table of ContentsQuestion 1........................................................................................................................................1What is honeypot? Under what circumstances, the use of deception can be considered asethical in relation to online aspects of organization or individual...............................................1Question 2........................................................................................................................................3In what way does end users licence agreement come under ethical security area of mobiledevice applications.......................................................................................................................3Question 3........................................................................................................................................4What is meant by legacy contract? State difference between legal and ethical differences indigital legacies.............................................................................................................................4Question 4........................................................................................................................................6Appropriate age for using social networking platform................................................................6References........................................................................................................................................8

QUESTION 1What is honeypot? Under what circumstances, the use of deception can be considered as ethicalin relation to online aspects of organization or individualHoneypot is regarded as a computer security mechanisms which is useful in detecting andrefracting any sort of counteract aspects in the domain of information system. The concept isapplicable in computer terminology and it also consists data which seems to be an authenticaspect of the site. However, at the same time it is purely isolated and monitored. The concept issimilar like cops finding a criminal (The Legal and Ethical Issues of Deploying Honeypots.2002). Typically, honeypots lie under new and developing technology which works forcommunity security. Honeypot is concerned with some issues such as entrapment, liability andprivacy; however instead of that the concept is utilized in technological world. All the sorts of honeypots generate their value by misleading attackers and defending anetwork. Bluetooth, drives and wifi passwords are some of the devices that are chiefly used forthe purpose of transferring data from one place to another; hence they are directly associatedwith security values. In this respect, the terms “good and evil” defines religious andphilosophical traces (Rowe and Rrushi, 2016). Traditionally, all the business entities used tofollow ethical business practices which includes appropriate consideration on social moral valuesystem. Honeypots are chiefly designed for the purpose of deceiving blackhat practices. Thisalso includes automated attacks from worms and human hackers. Thus, such circumstancesdepicts threats wherein deception is called unethical. At the time of using honeypot, legal laws are required to be adhered such as Cyber Law101 which has all the provisions related to honeypot deployments. The law is required to beapplied for the purpose of minimizing security related issues. This is also useful for the purposeof strengthening privacy facets. It also comprises of several ethical and legal dimensions and the most common exampleis entrapment which is the conception and planning of an offense. It is related to the area ofhoneypot which also refers to changing the attractiveness of computer system in such a mannerso that it can allow to get access even in unauthorized manner. However, on the other hand,privacy is an issue with honeypots which is also segregated among attacker and defender. For1

instance- in South African context, the concept of honeypot came into conflict because of currentelectronic communication and transaction act legislation (Honeypots: Are They Illegal?. 2003).This legal aspect states that an interception direction needs to be directed by the designated judgeto authorise the inception of communication. Deception technology has been used with honeypot as an addition of advancedautomation for scale. It is also useful in addressing the automated deployment of honeypotresources. This is managed on a larger scale in commercial enterprise or in governmentinstitution. Typically, it is used in business entities for the purpose of luring a hacker into asystem which manages different purposes. Herein, the administrator can keep an eye on thehacker to exploit the vulnerability of the system (Ethical Deception and Preemptive Deterrencein Network Security. 2005). Thus, it is also useful for the purpose of ascertaining weaknesses ofthe system; hence accordingly it can be redesigned. Under this, the hacker can be caught whilegetting authorised access to the system. Therefore, on security basis, honeypot could be used andas a result, several spam activities can be discovered through applying it in business practices. Itis also useful for the purpose of preventing issues such as terrorism and other criminal activities.Bluetooth is also a major device that is used for the purpose of transferring data from onehandset to different handset. It also creates different security issues especially while transmittingimportant information. Bluetooth is an inbuilt mobile application which can also assist the userto transfer data; however in relation to honeypot, it aids in enabling attacks by successfullylimiting the client device discoverability. WiFi honeypots is also considered as a new hacker trap that which searches for wirelessaccess points in the nation’s capital and it can also war drive right in the trap. This is the reasonthat has developed to Wireless Information Security Experiment that aids in emphasizing onsecurity facets. This also provides different access points to vulnerable computers to enhance thenetworking ability. Therefore, in this realm it can be said that drives can also be used for thepurpose of ascertaining the areas that can creates issues related to hacking and other securityaspects. 2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Legal and Ethical Issues in Web Technology
|7
|1709
|431

Questions in Relation with Legal Aspect of Business | Business Law
|7
|1541
|32

Cookies, Privacy and Cyber Security: A Look at the Importance of Cybersecurity in the US
|4
|787
|462

Legal Regulation and Compliance PDF
|5
|606
|92

Ethics, Professionalism and Governance: Case Study 10-Jobs for you Employment Agency
|5
|827
|69

(solved) Property Law Assignment
|6
|1266
|491