Discussion Post
Respond to the following prompts and questions:
o Identify the security components necessary to protect the information systems infrastructure. What key hardware components should be implemented?
o Why are authentication methods important in assuring that only authorized users are accessing the system? Classify the levels of access controls.
o Explain the use of an intrusion detection system (IDSs). How does such a system identify an intrusion? Differentiate between network level and host-based IDSs.
The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.