a client is concerned about a hacker compromising a network in order to gain access to confidential research data. what could be implemented to redirect any attackers on the network?