Exploration of systems designed to detect unauthorized access or attacks on networks and systems.