Describes those items that will be the first things that let you know something is inappropriate.
a: Intrusion Detection
b: Anomaly Detection
c: Incident Response
d: Security Audit