Honeypots
It is a technique using sacrificial machines in cyber security to deceive and entice a hacker, so that you might have control of the hacker’s data and subsequently monitor the attacker’s methods. The hacker thinks that he is infiltrating the real machine.
The objective of the plan is to encourage a hacker to start an attack into your network and engage with your information security officers, probably using a phishing email to get the hacker network access.
What the hacker does not realize is that they are now being monitored. Proactive security officers use honeypot techniques to allow hackers to breach the honeypots easily so that so that you can subsequently monitor the hacker’s techniques and get detailed information about hackers operations and procedures.
The objective is to collect intelligence on the adversary without their being aware of it. With this plan the hackers will try to infiltrate your organization sensitive data by penetrating an organization’s sensitive data data with the aim to gain access to the whole organization network. This would potentially allow them to breach the systems and the sensitive information they are interested in.