Computer Segurity
Mostrando 1-1 de 1 artigos, teses e dissertações.
-
1. Monitoring activities in hosts prepared to be compromised (Honeypots) / Monitoração de atividades em máquinas preparadas para serem comprometidas (Honeypots)
Not long ago, information systems security was closely associated with passive protection, always assuming a purely defensive stance. Nowadays, this approach is changing. Reactive measures are helping to improve systems security, with the use of hosts prepared to be compromised (honeypots) providing information about the techniques used by the attackers, fro
Publicado em: 2004