What is the primary function of a decoy system designed to attract and analyze potential security threats within a network?
Boosting the performance of network resources
Strengthening network encryption
Attracting cyber attackers to analyze their activities
Filtering malicious traffic before it reaches the network