Answer:
monitor potential hacking carried out over the Internet
Step-by-step explanation:
5.3m questions
6.9m answers