In the previous chapter we discussed the components of an adaptive security management system. Clearly, these various components interact to form a system that tries to find weaknesses, detect intrusion and abuse, and take countermeasures. In the following parts we describe a number of ways in which some of these components interact to provide security services. In the second section we briefly focus on formal security models and give an example of how such a model is used by the security management system.