What is the primary function of a decoy system designed to attract and analyze potential security threats within a network?
Attracting cyber attackers to analyze their activities
Boosting the performance of network resources
Filtering malicious traffic before it reaches the network
Strengthening network encryption