The basic technology behind intrusion detection and examine the approaches taken by intrusion detection systems both at the network and host level; examine the differences between using host-based and network-based IDSs and how each of them can be implemented; analyze the different responses required depending on the risk/threat to the system and how to handle intrusions. The unit will first examine in detail the different approaches in Intrusion Detection Systems (IDS). Next, the unit will cover how an intrusion detection system responds to an alarm. How to design and deploy an IDS to fit the requirements of differing organizations ranging from small LAN based system to multi-levsl... -- Course Website