Attacks are shunted away from the most critical systems.
Examples include honey pots used to lure attackers away from real targets
and toward false and planted information, lightning rods used to create
attractive targets so that attackers direct their energies away from real
targets, shunts used to selectively route attacks around potential targets,
and jails used to encapsulate attackers during attacks and gather information
about their methods for subsequent analysis and exploitation.
Complexity: All of these techniques are easily implemented at some level.
fc@red.a.net