Scenario: The CIO of Insecure University is convinced that a Honeypot is just what the university needs. Your job is to recommend the type or types of honeypots that should be deployed and the level of interaction of the honeypot that you feel is appropriate. Justify your choices with solid facts.
This University has:
FTP, HTTP, Web and DNS
2 remote campuses to access internal network resources
professors and students access the web server, FTP, and mail server
Corporate accesses internal resources especially when on travel