detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems