Intrusion Detection

Need to consider both physical and cyber intrusions. Technologies that can be brought to bear include: