Currently, the most employed technique used to prevent unwanted access and manipulation of information over a network, or prevent the spreading of viruses, is to prevent an unauthorized device from gaining access to the network or other resource that maintains sensitive information.