Access control, ACL, Administrative privileges, Antivirus, Antivirus software, Application security, Auditing, Authentication, Biometrics, Current threats, Digital certificates, DMZ, Encryption, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information risk management, Intrusion management, ISA Server, ISA Server 2004, ISA Server 2006, malware, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security in 2010, Security management, Security products, Security Program Management, Security tokens, SFTP, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Viruses, vulnerability management, Web security, Windows firewall, Windows Security, worms VIEW ALL TAGS
If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?
m suppose to build a honeypot system for my final year project, since my title is "developing a honeypot system for network administration" i chose the title, cus its unique, nobody ever has done it in our college yet, but now i'v been reading about it, n m confused on how to build one, does...