Watch this video on YouTube
What is used to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems?