Description: Advice on how to identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.