. "The decoy system should be loaded with numerous fake files, directories, and other information that may look real." . . .