|
|
|
Sereysethy Touch and Jean-Noël Colin
To proactively defend computer systems against cyber-attacks, a honeypot system?purposely designed to be prone to attacks?is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real sy...
ver más
|
|
|