Institutional Repository

The Legal and Ethical Issues of Deploying Honeypots

Show simple item record

dc.contributor.author Ronald Mitchell Campbell
dc.date.accessioned 2014-03-20T11:34:50Z
dc.date.available 2014-03-20T11:34:50Z
dc.date.issued 2014-03-20
dc.identifier.uri http://hdl.handle.net/10500/13279
dc.description.abstract The purpose of this study is to identify the legal and ethical issues involved with the deployment of a computer system defence implementation known as a honeypot. During the course of this research reference shall be made to the term honeypot as an umbrella term covering honeypots themselves, honeynets, honey farms and honeytokens. These systems and devices all claim a common characteristic in that they masquerade as legitimate systems, however their main purpose is to detect, track and analyse patterns of behaviour, both user and software, when the system is illegally accessed. The aim of this research is to derive a strategic framework for minimizing the legal and ethical risks involved in deploying honeypots specifically within South Africa, but based on best practice from around the globe. The study will derive a taxonomy for honeypots based on their security goals. The taxonomy will serve as basis for evaluating the legal and ethical risks relative to the security goals of honeypots. The study has been conducted using a wide ranging literature review covering the legal landscape with regards to the areas of entrapment, privacy and liability, and their application in the field of cybercrime based upon the current legal framework in South Africa. This research will determine the different scenarios in which honeypots may and should be deployed and the ethical issues involved in deploying a honeypot specifically addressing the alignment with the various codes of conduct required by computer professionals. The ethical and legal risks involved in the deployment of a honeypot will be highlighted and ultimately a strategic framework for minimizing the legal and ethical issues involved with the deployment of honeypots will be outlined. This will take the form of a checklist designed to guide the practitioner in deployment of these tools in a legal and ethical manner. en
dc.language.iso en en
dc.subject Technical Report en
dc.title The Legal and Ethical Issues of Deploying Honeypots en
dc.type Technical Report en
dc.description.department Computing en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics