| A honey pot is rather a scientific tool for observing intrusions. As a security countermeasure it is probably not very effective or efficient. |
| •owl:Thing |
| •sec:Countermeasure |
| •sec:TechnologyMistakenlyUsedAsCountermeasure |
| •sec:HoneyPot |
| dc:description | Fishbowl: The area of a computer system where an intruder is sent for its behaviour to be observed. (ODotI) |
| dc:description | A honeypot is a trap set to detect or deflect attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information that would be of value to attackers. (Wikipedia) |
Class(sec:HoneyPot partial restriction(sec:protects allValuesFrom(intersectionOf(unionOf(sec:_Deflection
sec:_Detection
sec:_Prevention)
unionOf(sec:_Confidentiality
sec:_Integrity
sec:_Availability)
sec:_Technology)))
restriction(sec:protects someValuesFrom(sec:_Technology))
restriction(sec:protects someValuesFrom(sec:_Confidentiality))
restriction(sec:protects someValuesFrom(sec:_Deflection))
restriction(sec:protects someValuesFrom(sec:_Prevention))
restriction(sec:protects someValuesFrom(sec:_Availability))
sec:TechnologyMistakenlyUsedAsCountermeasure
restriction(sec:protects someValuesFrom(sec:_Detection)))