takako is a security engineer for her company's it department. she has been tasked with developing a security monitoring system for the company's infrastructure to determine when any network activity occurs outside the norm. what essential technique does she start with?