Honeypots for Database Attack Detection
What is the main objective of implementing a database honeypot in this experiment?
What is the purpose of creating decoy tables such as `users_decoy` and `credit_cards_decoy`?
Which of the following SQL operations on a decoy table is considered suspicious?
What type of information is stored when suspicious activity is detected?
Which security concept is demonstrated by the use of a database honeypot?
Why is the honeypot database not used as a production system?