Consider a scenario where you are a security analyst for a Linux-based system. You see a user called gamma running a process called exploreallfiles that is not authorized on the system.