You need to implement information security controls that create an isolated environment for hackers, preventing them from compromising critical targets while also gathering information about their activities. Which of the following would you use for this purpose?