Discussion Post
• Compare and contrast host and network-based intrusion detection systems. If restricted to choosing only one solution, would you select HIDS or NIDS? Provide rationales for your selection.
• Canan Intrusion Detection System and Intrusion Prevention systemcan be alternatives to each other? Please explain.
• Describe the role of distributed systems in the detection of attacks.
• Describe the role of honeypots in the discovery of attacks.
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.