... Manage the Policies? The individual or group of people that polices and maintains the network and its security must haveaccess to every area of the network. Therefore, the security policy management ... IDS can send alarms to a management console withdetails of the activity and can often order other systems, such as routers, to cut off the unautho-rized sessions. In the physical security analogy, ... itsresults in the 20011Computer Crime and Security Survey. The goal of this effort is to raise the level of computer security awareness and to help determine the scope of computer crimein the United...