Skip to main content

Introduction to cyber security

The image shows a computer on a mouse trap.

 3.2 Honeypots