Intrusion System Components