This document discusses intrusion detection and prevention systems. It defines intrusion, intrusion detection, and intrusion prevention. It describes the components and approaches of intrusion detection systems, including misuse detection, anomaly detection, host-based detection, and network-based detection. It compares the pros and cons of different approaches and deployment methods. It also discusses key metrics, architectures, and examples like Snort.