원문정보
초록
영어
Security is one of the most important issues in E-government. All of the security approaches that are common in E-commerce are applicable to E-government. But Egovernment is a little different from E-commerce. Usually government networks can communicate to each other better than business networks, because, most of them are connected for transferring information, but businesses are competitors and they don't disclose their sensitive information. Utilizing "honeypots" is a good solution for tracing hackers and revealing their tools. In this paper, "connectedness" of E-government networks and honeypots are employed to propose an approach for securing an E-government network. This framework provides suitable resources for hackers; and simultaneously, it prevents them from misusing those resources for future attacks.
목차
1. Introduction
2. E-government
3. Honeypots
3.1. Physical honeypot
3.2. Virtual honeypot
3.3. Advantages and disadvantages of various kinds of honeypots
3.4. Honeynet and Honeywall
4. The proposed model of a Fault tolerance honeynet for securing e-government
5. Conclusion
References
