Catching Hackers with Honeypots: What is a Honeypot?