Discussion Post: Database Honey Pots and Hashing/Encrypting a Password (Cybersecurity)
o Why would a database administrator set up a honeypot?
o What role does a firewall play in a honey pot design?
o What is the difference between hashing a password and encrypting it?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.