Explain in specific terms the use and value of rule-writing in a Snort-centered IDS/IPS security strategy for government agencies, not-for-profit organizations and business enterprises. Discuss measures can and should be employed to write, tailor and revise effective rules, assure their continued effectiveness and value for the specific organization, and avoid overly-broad rules that could encumber and sabotage the process. (500-600 words)