Journal Question:
What uses could honeypots have in Law Enforcement?
or this discussion, find a recent article that involves either malware, a DDOS attack, or an underground economy aimed at providing tools to network attackers.
Give the URL, title, and brief description of the article, then answer the following questions:
What vulnerability did this attack or tool exploit?
Who was responsible for the attack or the tool?
What can be done to defend against the attack or the tool?
After making your initial post, respond to two of your classmates postings.
Journal Question:
What uses could honeypots have in Law Enforcement?