Validity of the counter-app method in the assessment of intrusions.