Abstract: | Most organizations today accept that it is a fundamental business requirement to protect electronic information assets, and are implementing an increasing number of information security counter_measures, such as intrusion detection systems (IDS), access control mechanisms, and anti_virus products to protect their IT systems from potential security threats. |