Honeypots application in Internet threats detection / presented by Tomáš Sochor.

By: Sochor, Tomáš [speaker.]Contributor(s): IGI Global [production company.]Material type: FilmFilmSeries: Global Video StreamingDescription: 1 streaming video (128 minutes) : sound, colourContent type: two-dimensional moving image | spoken word Media type: electronic Carrier type: online resourceISBN: 9781466695979; 1466695978Other title: Title from web site: Internet threat detection using honeypotsSubject(s): Internet -- Security measures | Computer security | HackingGenre/Form: Educational films.DDC classification: 004.678 LOC classification: TK5105.875.I57 | S635 2016Online resources: Click here to view this ebook.
Contents:
Section 1. Honeypot introduction -- Section 2. Internet threats -- Section 3. Application of honeypots in real networks -- Section 4. IPv6 threats and detection -- Section 5. Results from experimental honeynet.
Summary: The internet has presented a vast number of opportunities to connect and communicate with individuals all over the world. This heightened connectivity has also brought about a number of security threats as criminals continue to find new ways to infiltrate the private data of corporations and individuals alike. This video lecture explores the techniques employed by honeypots intended to hinder the ability of cyber criminals to attack or otherwise gain unauthorized access to private data and systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Streaming Video UT Tyler Online
Online
TK5105.875.I57 S635 2016 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9597-9 Available ocn919337352

Section 1. Honeypot introduction -- Section 2. Internet threats -- Section 3. Application of honeypots in real networks -- Section 4. IPv6 threats and detection -- Section 5. Results from experimental honeynet.

The internet has presented a vast number of opportunities to connect and communicate with individuals all over the world. This heightened connectivity has also brought about a number of security threats as criminals continue to find new ways to infiltrate the private data of corporations and individuals alike. This video lecture explores the techniques employed by honeypots intended to hinder the ability of cyber criminals to attack or otherwise gain unauthorized access to private data and systems.

Mode of access: World Wide Web.

There are no comments on this title.

to post a comment.