This is triggered when an unauthorized access attempt is detected by the system's security mechanisms, such as running an untrusted application or accessing restricted files.
This is triggered when an unauthorized access attempt is detected by the system's security mechanisms, such as running an untrusted application or accessing restricted files.