Abstract :
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider, the trusted individual who knows our internal organization. These individuals are not after our systems, they are after our information. We discuss how honeypot technologies can be used to detect, identify, and gather information on these specific threats.
Keywords :
authorisation; computer crime; information resources; external threat; honeypot technology; information gathering; Computer networks; Credit cards; Government; Information security; Information systems; Information technology; Intrusion detection; Power system security; Research and development; Shape;