"Responsible identifying things such as attempts to gain unauthorized access, abnormal usage patterns, system bottlenecks, etc." . . . .