"This approach might include technologies such as firewalls, intrusion detection, authentication and access control hardware and software, and antivirus protection on desktop computers and at gateways into the network." . . . . . .