Describe the protection each technology provides?

  Discuss these technologies 1)host based intrusion detection system 2)network based intrusion detection system 3)intrusion prevention system 4)honeypots and honeynets and describe how you deploy them to protect a small business network. Describe the protection each technology provides?   

× How can I help you?