Designed to lure a potential attacker away from critical systems ____________ are decoy systems that divert an attacker from accessing critical systems, collect information about the hacker's activity, and encourage the attacker to stay on the system long enough for administrators to respond.
Fill in the blank(s) with the appropriate word(s).
honeypots
Computer Science & Information Technology
You might also like to view...
AutoFill is an Excel tool that add consecutive values to a range of cells
Indicate whether the statement is true or false
Computer Science & Information Technology
ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology