Discussion
Discuss the technologies 1) host based intrusion detection system 2) network based intrusion detection system 3) intrusion prevention system 4) honeypots and honeynets and describe how you deploy them to protect a small business network. Describe the protection each technology provides?