Skip to main content

Glossary

A B C D F H I M P R S T V W All

An IT security tool connected to a network that mimics likely targets of cyber attacks (e.g. vulnerable networks) in order to attract attempted attacks. When cybercriminals gain access to these 'decoy' systems, security professionals can gather information about the method of intrusion, the purpose of the intrusion and the perpetrators, which helps to thwart attack attempts on real targets.

Any computer (personal computer, workstation, mainframe computer) or other device connected to a network.