Problem
Compare and contrast network-based and host-based IDS use in an enterprise network infrastructure. Determine the feasibility and necessity of utilizing one of these IDS implementations over the others and explain which you feel is more important and advantageous in an enterprise setting. Use the Internet to research at least one commonly used intrusion detection tool. Explain why you would or would not consider implementing this product in your organization. Justify your response. While searching the Internet, did you find any useful resources that could help in clarifying these concepts? Share with your classmates, and include links to any useful resource you find.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.