A mechanism used in computer security used to detect or counteract unauthorized access of information systems.