How to use nessus safely2/15/2023 They exploit both well-configured systems and vulnerable systems. Network intruders are becoming more sophisticated in their approach, resulting in many difficulties in preventing them. The fusion of DMZ and Honeypot into the security models of the campus network made it more robust. Conclusion: Honeypots are used to detect vulnerabilities based on the attacker's behaviour and, data collected by honeypots can be used to enhance other security technologies. AJRCOS, 13(1): 14-28, 2022 Article no.AJRCOS.80123 15 Administrators to effectively management the security of the campus networks. The fusion of DMZ and, Honeypot provide the System Original Research Article Nikoi et al. Results: Two firewall DMZ architecture techniques protect sensitive resources of the campus network by sanctioning the inflow and outflow of traffic, determining which segment allow and disallow traffic, whiles the Honeypot techniques were configured to keep the attention of attackers diverted from the main network, the full strength of an attack, until the administrators are prepared to put the effective counter in place. Penetration testing was used in the assessment of the University of Education's network infrastructure, and to demonstrate attacks and intrusion into the network infrastructure. Methodology: The integration of De-Militarized zone and Honeypot techniques was used to beef up the security of the campus network against vulnerabilities and exploits. Place and Duration of study: University of Education, Winneba-Kumasi campus. Aim: To discover the vulnerabilities and enhance the creation and deployment of secured campus network. The increasing complexity of information systems, as well as the rapid development of new vulnerabilities and exploits, the security of campus networks needs to be hardened to minimize or eradicate security flaws.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |