Compare and contrast the importance of intrusion detection systems (IDS), intrusion prevention systems (IPS), and the use of firewalls. Elaborate on any major differences or similarities among them and explore how they would work in conjunction with a honeypot.