Honeypots application in Internet threats detection / presented by Tomáš Sochor.Material type: FilmSeries: Global Video StreamingDescription: 1 streaming video (128 minutes) : sound, colourContent type: two-dimensional moving image | spoken word Media type: electronic Carrier type: online resourceISBN: 9781466695979; 1466695978Other title: Title from web site: Internet threat detection using honeypotsSubject(s): Internet -- Security measures | Computer security | HackingGenre/Form: Educational films.DDC classification: 004.678 LOC classification: TK5105.875.I57 | S635 2016Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Streaming Video||UT Tyler Online Online||TK5105.875.I57 S635 2016 (Browse shelf)||https://ezproxy.uttyler.edu/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9597-9||Available||ocn919337352|
Section 1. Honeypot introduction -- Section 2. Internet threats -- Section 3. Application of honeypots in real networks -- Section 4. IPv6 threats and detection -- Section 5. Results from experimental honeynet.
The internet has presented a vast number of opportunities to connect and communicate with individuals all over the world. This heightened connectivity has also brought about a number of security threats as criminals continue to find new ways to infiltrate the private data of corporations and individuals alike. This video lecture explores the techniques employed by honeypots intended to hinder the ability of cyber criminals to attack or otherwise gain unauthorized access to private data and systems.
Mode of access: World Wide Web.