A trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers.

Loading conversations.
Similar or Related Terms
Statistics
287
Characters
53
Words
27.66
Flesch Reading Ease
16
Flesch Kincaid Grade