List three disadvantages of using a honeypot approach.

What will be an ideal response?

The disadvantages of using a honeypot approach are:
·      The legal implications of using such devices are not well defined.
·      An expert attacker, once diverted into a decoy system, may become angry and launch a more hostile attack against an organization's systems.
·      Administrators and security managers need a high level of expertise to use these systems.
·      Administrators should also be wary of the wasp trap syndrome. In this syndrome, a concerned homeowner installs a wasp trap in his backyard to trap the few insects he sees flying about. Because these traps use scented bait, however, they wind up attracting far more wasps than were originally present. Security administrators should keep the wasp trap syndrome in mind before implementing honeypots.
·      Special care must be taken in order to ensure that a honeypot cannot be compromised in a way that could lead to further attacks on your networks or systems.

Computer Science & Information Technology

You might also like to view...

______ refers to the process of translating instructions into signals the computer can execute.

A. Decoding B. Decryption C. Digitalization D. Deconstruction

Computer Science & Information Technology

____________________ time is the hours of a 24-hour day that are not specified as working time.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology