access list / administrative control / bayesian filtering / exception / fencing / firewall / fuzzing / hardening / packet filtering / proximity / security policy