Intrusion Prevention Applications use the system call gateway to affect the system. Successful system compromise possible only via system calls. UNIX operating systems have 300 different system calls. Most applications need only 60. Arguments to system calls describe the desired action completely.