Answer:
monitor potential hacking carried out over the Internet
Step-by-step explanation:
4.6m questions
6.0m answers