Write a paper essay on the development on computer security preferences in whitelisting, intrusion detection or user profile risk mapping