GLOSSARY/Security

Honey Pots

Decoy systems or contracts designed to attract and identify malicious actors.

In a defensive context, honey pots are used by security researchers to study attacker behavior and gather threat intelligence. In a malicious context, they are "trap" contracts that appear vulnerable but are designed to lock an attacker's (or user's) funds indefinitely.

RELATED INDUSTRIES

Ethical HackingCybersecurity

OPERATIONAL LOCATIONS

Global