You work as a freelance security consultant. You are now working for a large government and have been contracted to create a stand-alone system that should attract malicious activity. The system should mimic an existing productive system but with fake non-sensitive data. The activity in this new system should be recorded so security analysts can review and identify patterns in the malicious activity. What best defines this type of system?
Ad hoc target
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|
|Attacks, Threats, and Vulnerabilities|