Skip to main content

๐Ÿ’ผ SC-26 Decoys

Descriptionโ€‹

Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.

Similarโ€‹

  • Internal
    • ID: dec-c-2ba5ac33

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ SC-26(1) Decoys _ Detection of Malicious Code