To learn how to update the categories for this article, see here. To update categories, edit the metadata template.
Definition: Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed with appropriate forensics and diagnostics [d] [e]