E-Government: Aspects of Security on Different Layers
DEXA '01 Proceedings of the 12th International Workshop on Database and Expert Systems Applications
e-Government and Cyber Security: The Role of Cyber Security Exercises
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 04
Virtual honeypots: from botnet tracking to intrusion detection
Virtual honeypots: from botnet tracking to intrusion detection
Hi-index | 0.00 |
One of the big challenges of E-government adoption among citizens is security. Numerous security approaches exist in E-commerce, and all of them are applicable to E-government. Usually government networks can communicate to each other better than business networks, because, most of them are connected for transferring information, but businesses are competitors and they don't disclose their sensitive information. Utilizing "honeypots" is a good solution for tracing hackers and revealing their tools. In this paper, "connectedness" of E-government networks and honeypots are employed to propose an approach for securing a fault tolerance E-government network. This framework solves the problem of low interaction and high interaction honeypots. It creates an environment for hackers that they can use many of the available resources; at the same time, it prevents them from misusing those resources for future attacks.