Last Updated on August 15, 2021 by Admin 2
Which of the following is used to lure attackers into false environments so they can be monitored, contained, or blocked from reaching critical systems?
- Segmentation controls.
- Shadow applications.
- Deception technology.
- Vulnerability management.