Designed to lure a potential attacker away from critical systems ____________ are decoy systems that divert an attacker from accessing critical systems, collect information about the hacker's activity, and encourage the attacker to stay on the system long enough for administrators to respond.

Fill in the blank(s) with the appropriate word(s).

honeypots

Computer Science & Information Technology

You might also like to view...

AutoFill is an Excel tool that add consecutive values to a range of cells

Indicate whether the statement is true or false

Computer Science & Information Technology

ISO details a model process for managing information security that comprises the following steps: plan, do, ________, and act.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology