Create one discussion thread and answer the following questions:
One of the best strategies for network security management is to lay out traps to prevent and deter security incidents. One of these strategies is to use Honeypot/Honeynet. How a honeypot system captures attack traffic and further allows analysis of it? Give some examples.
Your initial post should be 250-300 words. There must be at least two APA formatted references (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.