Title | ||
---|---|---|
Honeypot technologies and their applicability as a strategic internal countermeasure. |
Abstract | ||
---|---|---|
Honeypot technologies are proving successful in mitigating against external attackers and there is significant literature for their deployment and development as external facing countermeasures. Very little research has been done on their suitability or adaptability as an internally deployed countermeasure. This paper explores issues with the deployment and design of honeypot technologies as an internal countermeasure to insider malfeasance. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1504/IJICS.2007.015503 | IJICS |
Keywords | Field | DocType |
insider malfeasance,significant literature,strategic internal countermeasure,honeypot technology,internal countermeasure,external attacker,information security,computer security,countermeasures | Countermeasure,Adaptability,Honeypot,Software deployment,Computer security,Computer science,Information security,Insider | Journal |
Volume | Issue | Citations |
1 | 4 | 4 |
PageRank | References | Authors |
0.55 | 0 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Craig Valli | 1 | 132 | 33.90 |