Title

Honeypot Technologies and Their Applicability as a Strategic Internal Countermeasure

Document Type

Journal Article

Publisher

Inderscience Enterprises

Faculty

Computing, Health and Science

School

Computer and Information Science

RAS ID

4669

Comments

This article was originally published as: Valli, C. (2007). Honeypot technologies and their applicability as a strategic internal countermeasure. International Journal of Information and Computer Security, 1(4), 430-436. Original article available here

Abstract

Honeypot technologies are proving successful in mitigating against external attackers and there is significant literature for their deployment and development as external facing countermeasures. Very little research has been done on their suitability or adaptability as an internally deployed countermeasure. This paper explores issues with the deployment and design of honeypot technologies as an internal countermeasure to insider malfeasance.

DOI

10.1504/IJICS.2007.015503

 

Link to publisher version (DOI)

10.1504/IJICS.2007.015503