Answer:
honeypot.
Step-by-step explanation:
Okay, let us first fill in the gap in the question above. Please, note that the capitalized word is the missing word.
"There are number of issues to consider when composing security policies. One such issue concerns the use of security devices. One such device is a HONEYPOT , which is a network security device with characteristics of a decoy that serves as a target that might tempt a hacker''.
In order to make the world a safer place to live, there is a need for good and efficient Security policies. These policies are set by the authority or the government (legislative arm and executive arm of the Government) and with this the Judicial arm of the Government interprete and make sure that the policies are enforced.
In order to enforce the security policies and with the advancement of science, engineering and technology, devices are being made or produced to help in enforcing security policies and one of them is the use of HONEYPOT.
The main use or advantage of honeypot is to track hackers or anything related to hacking.