The paper is designed to outline the necessity of the implementation of Intrusion Detection systems in the enterprise environment. The purpose of the paper is to clarify the steps that need to be taken in order to efficiently implement your Intrusion Detection System, and to describe the necessary...