Skip to main content

💼 SC-26 HONEYPOTS

Description​

The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.

Similar​

  • Internal
    • ID: dec-c-b610836b

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 SC-26 (1) DETECTION OF MALICIOUS CODE