Implementation Of Internal Cyber ​​Traps