Using the document and internet research, submit an essay (with proper grammar, spelling, and punctuation) on how to detect, identify, resolve and document host or network intrusions along with reactive measures to respond to detected intrusion profiles.