– Create a ficticious organization called whatever “ABC Company” –

– Create a ficticious organization called whatever “ABC Company”
– Create a diagram of your honeypot and if it’s high or low involvement
– Identify how it’s connected in your network. Does it interface external or internal servers
– Identify an example of items that they interfaced with ( mock it up)
– Identify what we have learned up to this point on what could have prevented this from happening
– Find a real example video or article of an organization that has did this and what recommendations that they made with the security environment.
– Create a presentation (slides or powerpoint) present to the class after the special guest.