That is, if one is told that ???Computer A is attacking computers on the network,??? one knows immediately to do something about ???Computer A.??? If, on the other hand, if one reads a list of all of the possibly suspicious activity in the network, one may experience information overload; one may not realize that a problem exists with ???Computer A.??? This is particularly true when ???Computer A?