Honeypots for The CIO of Insecure University Scenario: The CIO of Insecure University is convinced that a Honeypot is just what the university needs.

Your job is to recommend the type or types of honeypots that should be deployed and the level of interaction of the honeypot that you feel is appropriate. Justify your choices with solid facts.
This University has:
FTP, HTTP, Web and DNS
2 remote campuses to access internal network resources
professors and students access the web server, FTP, and mail server Honeypots for The CIO of Insecure University
Honeypots for The CIO of Insecure University Internal Resources and assessment
Corporate accesses internal resources especially when on travel Honeypots for The CIO of Insecure University Scenario: The CIO of Insecure University is convinced that a Honeypot is just what the university needs. Your job is to recommend the type or types of honeypots that should be deployed and the level of interaction of the honeypot that you feel is appropriate. Justify your choices with solid facts.
This University has:
FTP, HTTP, Web and DNS
2 remote campuses to access internal network resources
professors and students access the web server, FTP, and mail server
Corporate accesses internal resources especially when on travel Honeypots for The CIO of Insecure University Scenario: The CIO of Insecure University is convinced that a Honeypot is just what the university needs. Honeypots for The CIO of Insecure University
Different Types of Honeypots for The CIO of Insecure University
Your job is to recommend the type or types of honeypots that should be deployed and the level of interaction of the honeypot that you feel is appropriate. Justify your choices with solid facts. Honeypots for The CIO of Insecure University
This University has:
FTP, HTTP, Web and DNS
2 remote campuses to access internal network resources
professors and students access the web server, FTP, and mail server
Corporate accesses internal resources especially when on travel Your job is to recommend the type or types of honeypots that should be deployed and the level of interaction of the honeypot that you feel is appropriate. Justify your choices with solid facts. Honeypots for The CIO of Insecure University