have considered:
◦problem of intrusion
◦intrusion detection (statistical & rule-based)
◦password management