This paper discusses how firewalls and intrusion detection systems work, and conveys the necessity of such devices. This eight page paper has no bibliography.