The information system prevents non-privileged users from circumventing intrusion detection and prevention capabilities.