This lesson covers attacks that can elude intrusion detection systems. One of these attacks is called an insertion attack. This involves disguising a malicious code to sneak past an IDS. To prevent these kind of attacks, networks can use the following tools: - Honeypot - Padded cell and vulnerability tools This lessons also touches on e mail vulnerabilities such as phishing, spoofing and spam. It is also important to remember about fax vulnerabilities, which can be remedied via use of fax servers.