Problem
Do some research and produce a summary listing of available software intrusion detection systems. Determine the placement model and operational type of each. Interview the network administrator of a large organization to determine the types of attacks they encounter most often. A short report detailing the types and quantities of attacks seen, and the technologies used to detect attacks and provide.