Basic intrusion protection: the first line of defense

Making your system safe is no cinch, but here's a guide to getting started. The article examines various system security methods, including: identification and authentication techniques; firewalls; audit trails; and automated intrusion detection systems.