WHY STUDENT PREFER US?  
4.9/5

5 Star Rating

93940

Orders Deliver

3949

PhD Experts

24x7

Support

100%

Privacy

100%

Top Quality

Sample Details

Database Security

Number Of View : 24

Download : 0

Pages: 2

Words : 389

Question :

 

Why would a database administrator set up a honeypot?

What role does a firewall play in a honey pot design?

What is the difference between hashing a password and encrypting it?

 

Answer :

 

Answer1.

A honeypot is a tool that is used by the database administrator to detect unauthorized access to the information system. It is capable of making attackers slow down who can get access to the information system and damage confidential data. Honeypot creates several decoys that distract the attackers. It also helps the organization to train the security team to secure a database (Wouters et al., 2016). The database administrator sets up a honeypot to protect the database from the attackers. 

Asnwer2.

A firewall plays an important role in a honeypot design. A firewall works oppositely in a honeypot that of a normal firewall. A normal firewall restricts whatever comes into a system from the internet. On the other hand, a firewall in honeypot does not restrict what comes into a system from internet but allows traffics to come into the system from internet and then put restrictions on what is going out of the system or what system sends back out (Kobayashi et al., 2019). It helps the administrator to identify the vulnerabilities of the system. Thus, the administrator can redesign the system to protect from hackers.

Answer3.

Encrypting a password or encryption is a process of scrambling data in a way that can be unscrambled only by that person who has the corresponding key to unscramble and read it. It is a two-way function in which an individual encrypt something with an intention to decrypt it later (Baum et al., 2017). On the other hand hashing, a password is a process of mapping data of any size to a particular length with the help of an algorithm. It is a one-way function. 

References 

Baum, A., Zarmi, I., & Reiter, G. (2017). U.S. Patent No. 9,853,956. Washington, DC: U.S. Patent and Trademark Office.

Kobayashi, H., Zhang, Z., Ochiai, H., & Esaki, H. (2019, August). Probing Firewalls of Malware-Infected Networks with Honeypot. In Proceedings of the 14th International Conference on Future Internet Technologies (pp. 1-4).

Wouters, N., Downs, J., Harrop, M., Cox, T., Oliveira, E., Webber, S., ... & Vande Moere, A. (2016, June). Uncovering the honeypot effect: How audiences engage with public interactive systems. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (pp. 5-16).

 

Place Order For A Top Grade Assignment Now

We have some amazing discount offers running for the students

Order Now

Get Help Instantly

    FREE FEATURES

    Limitless Amendments

    $09.50 free

    Bibliography

    $10.50 free

    Outline

    $05.00 free

    Title page

    $07.50 free

    Formatting

    $07.50 free

    Plagiarism Report

    $10.00 free

    Get all these features for $50.00

    free

    Latest Blog Boost your grades with expert tips and tricks from our academic blog.

    Learn How to Write an Argumentative Essay Outline

    Have you been asked to write an argumentative essay by your instructor? If yes, then before you begin writing an argumentative essay, first select a good […]

    90 Outstanding Literary Research Topics and Ideas

    Are you seeking compelling literary research topics? No matter whether you are creating a master’s thesis or writing a college essay, the topic you choose […]

    10 Best Essay Writing Apps for Students [2024]

    If you are a student, then during your scholastic life you will be required to write many types of essay assignments. Since essay writing involves […]

    View More Blogs

    Let's Talk

    Enter your email, and we shall get back to you in an hour.