Systems and methods are provided for the detection and prevention of
intrusions in data at rest systems such as file systems and web servers.
Item requests are examined to determine if the request and/or the result
violates an item access rule. If either the request or the result
violates the item access rule, an access control manager is alerted and
appropriate action is taken such as not complying with the item request.
Embodiments of the invention also produce a scorecard to represent the
severity of an intrusion threat.