Answer the following questions. Your answer should be complete and at least one page in length. Although honeypots are common, some security professionals believe they should not be used because they...

1 answer below »


Answer the following questions. Your answer should be complete and at least one page in length.
Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think? Using the Internet and other sources research the ethical and legal issues that surround using honeypots. Could creating a honeypot be entrapment? What ethical issues surround using a honeypot to trick attackers? Does the information gained from a honeypot outweigh the risks?


Document Preview:

Answer the following questions. Your answer should be complete and at least one page in length. Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think? Using the Internet and other sources research the ethical and legal issues that surround using honeypots. Could creating a honeypot be entrapment? What ethical issues surround using a honeypot to trick attackers? Does the information gained from a honeypot outweigh the risks?






Answer the following questions. Your answer should be complete and at least one page in length. Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think? Using the Internet and other sources research the ethical and legal issues that surround using honeypots. Could creating a honeypot be entrapment? What ethical issues surround using a honeypot to trick attackers? Does the information gained from a honeypot outweigh the risks?
Answered Same DayDec 31, 2021

Answer To: Answer the following questions. Your answer should be complete and at least one page in length....

Robert answered on Dec 31 2021
128 Votes
Ethical and Legal Issues with honeypots

A honey pot is a computer system which is a part of the network of an organization imitating
other computer
systems of the organization (but of no production value) with a motive to attract /
trap / deflect the attackers who try to attack on the organization. They appear to be same as a part
of organization’s normal computer but actually are isolated and monitored and seem to contain
resources/information valuable to an attacker.
Issues with Honeypots:
1) Entrapment of the attacker: It is a widely understood in internet security community
that if an organization deploys honeypots, it can be prosecuted for entrapping the bad
guys who tried to attack on it. But this belief doesn’t seem very convincing to various
network security experts. The argument they present in support of using honeypots is that
by definition “Entrapment is an act conduct by a law enforcement agent which induces a
person to commit a crime which was unlikely to be committed by the person normally”.
According to them, this definition doesn’t fit with honeypots due to several reasons:
i) If the organization or the person has to be a part of law enforcement body then
only it can be accused of entrapment
ii) if it prosecutes the bad guy then only Organization can be accused of entrapment
iii) Even if the organization belongs to the law enforcement body and also prosecutes
the attacker, it is almost impossible to prove that the person himself had no intent
to attack the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here