Disscusion question 2
Question # 00006355
Posted By:
Updated on: 01/10/2014 09:57 AM Due on: 01/10/2014

http://www.honeynet.org/
Take a look at the Honeynet Project site at The Honeynet Project, specifically at the "Challenges" section. Read through the different challenges that have been issued. While it serves as a great source of information for analyzing attacks for the security community, it might also serve as a great source of information for attackers! Explain how defenders and attackers might successfully utilize this site. Is there anyway to manage who gets access to this information?

-
Rating:
5/
Solution: the Honeynet Project site