Watch this video on YouTube
What type of controls are intended to discourage potential attackers from targeting a system?