This document discusses intruders, intrusion detection systems, and their components and functions. It describes different types of intruders, intrusion detection systems, and their principles. It also discusses viruses, firewall design principles, types of firewalls, trusted systems and their models.