What is the process of detecting unauthorized access known as?
Intrusion detection
Misuse detection
Anomaly detection
Integrity detection
Submit