Discussion Post
There are a number of defensive technologies available to network security professionals, IDS, IPS, Firewalls, Honeypots, Honeynets, administrative, physical and technical controls. Choose one of these defensive technologies and describe its function, how it is implemented and maintained. Then pick a commercial or open source product in the same category and write your opinion in support or opposition of implementing the product.
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.