A method (and system) for detecting intrusions to stored data includes
creating a point-time-copy of a logical unit, and comparing at least a
portion of the point-time-copy with a previous copy of the logical unit.
The method (and system) monitors access to a data storage system and
detects an intrusion or any other intentional or unintentional, unwanted
modification to data stored in the data storage system. The method (and
system) also recovers data once an intrusion or other unwanted
modification is detected.