Network Security
  • Breach of internal security rules
  • Use of "Tor" anonymizing network
  • Peer-to-peer connections with suspicious hosts
  • Bitcoin mining