Scanning in Windows is deeper than the scanning in Linux and Max operating systems. Most tools that are used for scanning and enumeration have the ability to explore deeper because of the fact that the scripts that are developed by the developers are able to establish null or authenticated session with all the current versions of Windows. This is not the case with Linux operating systems because of the fact that it is hard to establish null sessions. For this reason, it is hard to establish deep exploration. From the data sets, it is evident that the depth of exploration of that undertaken in Windows. This is unlike the other operating systems which have shallow explorations. Windows operating system gives most information.
Honey pots are a tool that can be used to attract network intruders. In production, honey pots are use to detect, prevent and respond to attacks. On the same note, they are used in research to collect information leading into a knowhow of how and when attacks are done, hence policy formulation and prevention against the predicted attacks. Honey pots are installed on the network and used to track logging activity attempts that the attacker may be trying to use.
The victim is tracked about the logging activities and the security attempts that the hacker and attacker are trying to compromise. This is achieved by having inbound and outbound controls. The process of creating network to trap and track the behavior of the attacker is by having inbound and outbound controls in the network. There should be network-based intrusion detection systems.
This will enable network administrators to monitor what is taking place in the network. Honey pots would help security experts and researchers understand new trends that attackers are using in striving to attack a network. It is also important in a business environment because of the fact that businesses will use the attacks to build and strengthen their networks and seal any holes.
Kizza, J. M. (2005). Computer Network Security. Springer.
Matt, C. (1997). Introduction to network security. New York: Wiley.