Skip to main content
Introduction to cyber security
The image shows a computer on a mouse trap.
◄
3.2 Honeypots