is to Security systems Immune System Network environment Static data Uncorrupted data Non-self Any change to self Active processes on single host Cell Active process in a computer Mult cellular organism Computer running multiple processes Population of organisms Set of networked computers Skin and innate mmunity Security mechanisms, like passwords, groups, file permissions, etc Adaptive immunity Lymphocyte process able to query other processes to seek for abnormal behaviors Autommune response False alarm Self Normal behavior Non-self Abnormal behavior Network of Mutually trusting computers Each computer in a network environmentIS to Security Systems Immune System Network Environment Static Data Self Uncorrupted data Non-self Any change to self Active Processes on Single Host Cell Active process in a computer Multicellular organism Computer running multiple processes Population of organisms Set of networked computers Skin and innate immunity Security mechanisms, like passwords, groups, file permissions, etc. Adaptive immunity Lymphocyte process able to query other processes to seek for abnormal behaviors Autoimmune response False alarm Self Normal behavior Non-self Abnormal behavior Network of Mutually Trusting Computers Organ in an animal Each computer in a network environment