Skip to main content

๐Ÿ’ผ SC-26 HONEYPOTS

Descriptionโ€‹

The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.

Similarโ€‹

  • Internal
    • ID: dec-c-b610836b

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ SC-26 (1) DETECTION OF MALICIOUS CODE