Describe how host-based intrusion detection works, briefly contrasting it with network-based intrusion detection. Explain three types of threats against which HIDS is particularly effective.
Additional information
The problem related to Computer Science and it describes about how host-based intrusion detection works and how it contrasts with network-based intrusion detection.
Word limit: 125