Methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system