simulates a real network but is actually isolated and monitored so it can give advance warning of an intrusion.Insider threat ??? A threat posed by employees, contractors, business associates or other people who have inside access to a computer system.