Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that a...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
LPPM STIKI Malang
2025-06-01
|
| Series: | J-Intech (Journal of Information and Technology) |
| Subjects: | |
| Online Access: | https://jurnal.stiki.ac.id/J-INTECH/article/view/1924 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|