1. Global strategies
  2. Establishing network intrusion detection rules