Which of the following acts as a decoy to detect active internet attacks?
Honeypots are computer systems that are expressly set up to attract and trap individuals who
attempt to penetrate other individuals’ computer systems. The concept of a honeypot is to learn
from intruder’s actions. A properly designed and configured honeypot provides data on methods
used to attack systems. The data are then used to improve measures that could curb future attacks.
A firewall is basically a preventive measure. Trapdoors create a vulnerability that provides an
opportunity for the insertion of unauthorized code into a system. Traffic analysis is a type of passive