What do you think is the most effective method to explain if an attack has been made on the computer network include what malicious activities does your recommendation recognize as well as what activities does your recommendation not protect against?