Skip to main content
Article
Honeypot Technologies and Their Applicability as a Strategic Internal Countermeasure
ECU Publications Pre. 2011
  • Craig Valli, Edith Cowan University
Publication Date
1-1-2007
Document Type
Journal Article
Publisher
Inderscience Enterprises
Faculty
Computing, Health and Science
School
Computer and Information Science
RAS ID
4669
Comments

This article was originally published as: Valli, C. (2007). Honeypot technologies and their applicability as a strategic internal countermeasure. International Journal of Information and Computer Security, 1(4), 430-436. Original article available here

Abstract
Honeypot technologies are proving successful in mitigating against external attackers and there is significant literature for their deployment and development as external facing countermeasures. Very little research has been done on their suitability or adaptability as an internally deployed countermeasure. This paper explores issues with the deployment and design of honeypot technologies as an internal countermeasure to insider malfeasance.
Disciplines
Citation Information
Craig Valli. "Honeypot Technologies and Their Applicability as a Strategic Internal Countermeasure" (2007)
Available at: http://works.bepress.com/craig_valli/12/