Conduct research on the use of honeypots along with legal and ethical opinions. Using credible sources and APA format to address the following.
In your original post, answer the following:
As a security professional, what legal and moral issues might you encounter related to the use of honeypots for tracking and retaliating against the hacker?
Would you use honeypots in your selected company cybersecurity’s architecture? Why?