You work for a company with a large network. Due to the size, the security administrator has set up multiple instances of decoy data on isolated network segments away from legitimate resources used to distract potential attackers from actual production data and assets on the real network. What term best describes this security concept?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |