Cloud-based Honeypots, Data Loss Prevention Products, Air Gaps, and Cyber-Attackers
Follow the below directions and answer ALL questions. Make it in one word document
MLA style
Site all sources
Research cloud-based honeypots. What are their advantages? What are their disadvantages? When should they not be used? How could one be set up? Create a one-page paper of your research.
Research at least four data loss prevention (DLP) products from four different vendors. Create a table that compares at least six different functions and options. Based on your research, which would you choose? What features make this product the best? Why? Write a short paragraph that summarises your research.
Use the Internet to research how air gaps are used. In which environments are they used? What are some ways in which they have been circumvented? How would you air-gap a network? Write a one-page paper on your research.
Suppose you work for a company that has been the victim of a significant cyberattack that resulted in the loss of revenue and customers and generated ill will and a lack of trust in the organisation. An angry senior vice president says that the organisation should deploy an active defence, which includes tracking down the culprits and then retaliating against them. As support for her argument, she says that this is a common practice used by the government, and as long as there is no price to pay by the attackers, then these attacks will continue. Where do you stand? Should organisations be involved in retaliation? What are the advantages? What are the risks? Write a one-page memo about what you think should be done and why
Professor’s Name
Course
Date
Answers
Answer 1
Cloud-based honeypots are digital security systems that are used to trap potential hackers by mimicking false vulnerabilities such that cyber-attackers think that they can easily exploit the presented weaknesses (Siemons). The primary advantages of cloud-based honeypots are that they facilitate system recovery if hackers attack a system and can be deployed to any desired geographical location through cloud system configuration. In contrast, a disadvantage of this security mechanism is that it has a narrow field of view such that it cannot detect any activity not directed to it. Fingerprinting makes it easily detectable by hackers since cloud-based honeypots portray specific behaviors. Another demerit is that if a honeypot is attacked, it can be used to harm or infiltrate other systems (Ciampa 125). Cloud-based honeypots should not be used when hackers have already breached the system, but they should be deployed to help security experts know the threats and improve the system accordingly. They are set through system configuration in the cloud to detect different types of cyber-attacks to help a firm mitigate them.
Answer 2
Data loss prevention (DLP) products from different vendors
Symantec DLP
McAfee Total Protection DLP
Google Cloud DLP
CoSoSys Endpoint Protector
About Tool
Prevents data breach
Protects system against potential data loss
Monitors and secure sensitive data while at rest, in motion, or in use (BasuMallick)
Monitors and protect data
Platforms
Linux, Windows, and Mac
Mac, Windows, and Linux
Linux, Windows, and Mac
Linux, Windows, printers, and Mac
Best For
Enterprises
Small and big firms
Large enterprises
Mid-sized businesses
Deployment
On-premise and cloud-based (Cooper)
On-premise and cloud-based (Cooper)
On-premise and cloud-based (Cooper)
Cloud-hosted, virtual appliance, and cloud services
HIPAA, PCI DSS, and GDPR Approval
Compliant
Compliant
Compliant
Compliant
Data Encryption
Encryption protection
Simple data encryption
Complex data encryption
Complex data encryption
Table 1: Comparison of DLPs and their Functions and Options.
Based on my research, the best D...
👀 Other Visitors are Viewing These MLA Research Paper Samples:
- Software Problem And Providing Solutions4 pages/≈1100 words | 4 Sources | MLA | IT & Computer Science | Research Paper |
- How The A.I. Change The Human’s Life6 pages/≈1650 words | 6 Sources | MLA | IT & Computer Science | Research Paper |
- Network Questions Sample4 pages/≈1100 words | MLA | IT & Computer Science | Research Paper |
- Pros and Cons of Operationally Critical Threat, Asset, and Vulnerability Threat Model2 pages/≈550 words | 4 Sources | MLA | IT & Computer Science | Research Paper |
- Benefits and Risk of AI Technology when Replacing Humans1 page/≈275 words | MLA | IT & Computer Science | Research Paper |
- Computer System Recommendation (IT & Computer Science Research Paper)3 pages/≈825 words | MLA | IT & Computer Science | Research Paper |
- Evil Twin Attack3 pages/≈825 words | MLA | IT & Computer Science | Research Paper |