<Table> <Tr> <Td> </Td> <Td> This article needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed . (June 2014) (Learn how and when to remove this template message) </Td> </Tr> </Table> <Tr> <Td> </Td> <Td> This article needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed . (June 2014) (Learn how and when to remove this template message) </Td> </Tr> <P> In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems . Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site, but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, who are then blocked . This is similar to police sting operations, colloquially known as "baiting," a suspect . </P> <P> Honeypots can be classified based on their deployment (use / action) and based on their level of involvement . Based on deployment, honeypots may be classified as </P>

What is a honey pot in network security