HostedDB - Dedicated UNIX Servers

pilot_6 August 28, 1998 Intrusion Detection Pilot Program Guide 3 Resources Needed for this Phase The resources needed for this phase are knowledge of  your existing systems and your requirements. This can be provided by network management and security staff, and support can be offered by vendors, resellers and consultants. Output from this Phase 1.   A list of requirements that you generate. 2.   A detailed description of what will happen during Phase 2 to demonstrate whether the intrusion detection product meets the requirements outlined above.