"An intrusion into your network and host systems by persons
unknown is one of the biggest nightmares for systems
"... intrusions can happen to anyone, on any public or private
network. In order to best detect and respond to an intrusion,
you must first plan for an intrusion, then have all the appropriate
monitoring capabilities deployed."
"Building secure systems is not an adequate approach to
maintaining long term host security. By developing solid intrusion
detection plans, performing comprehensive security audits, and
scanning both network segments and host systems, we will have a
much better chance at successful intruder detection."