State the most effective method in order to find if an attack has been made on the computer network? Specify the malicious activities does your recommendation recognize? What activities does your recommendation not protect against? Give examples and/or details. Brief response, please involve source of the information.