Print This Page
A real or virtual system configured to attract and detect an intruder by mirroring a real production system.