1. Global strategies
  2. Developing intrusion detection software