How Do Intrusion Detection Systems Work?

Responsive image
source