9 Configurable computer hardware for cybersecurity; configurable computer hardware for encryption; configurable computer hardware for detecting, blocking, and intercepting malware and other system vulnerabilities; computer hardware, namely, physical decoy devices for cybersecurity of operational technology (OT) systems; computer hardware, namely, devices designed to mimic industrial automation infrastructure in order to deflect and detect cyber attacks using artificial intelligence