Honeypots: Tracking Hackers
Implementing PII honeytokens to mitigate against thethreat of Malicous insiders
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Exposing WPA2 security protocol vulnerabilities
International Journal of Information and Computer Security
Hi-index | 0.00 |
Honeypot technologies are proving successful in mitigating against external attackers and there is significant literature for their deployment and development as external facing countermeasures. Very little research has been done on their suitability or adaptability as an internally deployed countermeasure. This paper explores issues with the deployment and design of honeypot technologies as an internal countermeasure to insider malfeasance.