A host that is deliberately exposed to attack.
A security program designed to lure and distract a network attacker with decoy data. The honeypot appears to be a system that the intruder would like to crack but which, in reality, is safely separated from the actual network. This allows network administrators to observe attackers and study their activities without the intruders knowing they are being monitored. Honeypot programs get their name from the “like a bear to honey” metaphor.