USABILITY OF HONEYPOTS IN KENET MEMBER INSTITUTIONS IN WESTERN KENYA AS PROACTIVE DETECTION TOOLS FOR MONITORING CYBER RELATED INCIDENCES
Abstract
With the advent of the ever changing technology and the intense sophistication in methods and
means of committing illegal activities, crime is no longer narrowly defined vies-a-vie the law but
there is need to be able to handle technologically oriented crimes commonly referred to as
Cybercrimes. Cybercrimes are crimes that involve the use of computers to undertake illegal.
Collection of statistics associated with cybercrimes can be quite tricky and daunting, since their
collection and tabulation can only be done when aggrieved parties report them. Some of these
illegal activities that constitute cybercrimes include, but not limited to, creation of counterfeit
currency or official documents using computer scanners and graphics programs, embezzlement
of funds using computers to skim very small sums of money from a large number of accounts,
distribution of child pornography on the Internet, and theft of digital property. Other crimes that
can also be committed include fraud, hate crimes, stalking, gambling, hacking; spread of
malware, phishing, spamming, Botnet attacks, DDoS attacks, espionage and money laundering.
In this paper we present results on usability of HoneyPots in KENET member institutions in
western Kenya as proactive detection tools for monitoring cyber related incidences.
Downloads
Author(s) and co-author(s) jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere. Author(s) agree to the terms that the IJRDO Journal will have the full right to remove the published article on any misconduct found in the published article.