I. Identify the purpose of a trap and trace system and how it can be used to
Question:
I. Identify the purpose of a trap and trace system and how it can be used to trace incidents back to their sources.
II. Outline the process of how a trap often works. As mentioned in the text, it usually consists of a honey pot or padded cell and an alarm. Note that while the intruders are distracted, or trapped, by what they perceive to be successful intrusions, the system notifies the administrator of their presence.
III. Examine and review the trace feature of the system as it is a process by which the organization attempts to determine the identity of someone who is discovered in unauthorized areas of the network or system.
IV. Emphasize that if the individual is outside the security perimeter of the organization, then numerous legal issues arise.
V. Compare and contrast the facts that trap-and-trace systems are similar to pen registers and earlier versions of which recorded numbers that were dialed in voice communications.
VI. Identify the legal restrictions and drawbacks of trip-and-trace systems.
• The trap portion frequently involves the use of honey pots or honey nets.
• When using honey pots and honey nets, administrators should be careful not to cross the line between enticement (the process of attracting attention to a system by placing tantalizing bits of information in key locations) and entrapment (luring an individual into committing a crime to get a conviction).
• Justify the facts that enticement is legal and ethical whereas entrapment is not.
Step by Step Answer:
Principles Of Information Security
ISBN: 9780357506431
7th Edition
Authors: Michael E. Whitman, Herbert J. Mattord