You have found a user in your organization who has managed to gain access to a system that this user was not granted the right to use. This user has just provided you with a working example of which of the following?
A.
Intrusion
B.
Misuse
C.
Intrusion detection
D.
Misuse detection
E.
Anomaly detection