These are counter-measures to attackers that attempt to enter your systems. Techniques Honeypot Honeynet Honeyfile Honeytoken DNS Sinkhole