Which of the following should MOST concern an IS auditor reviewing an intrusion detection system (IDS)?