What is the correct action to be taken by Rebecca in this situation as a recommendation to management?
How can she restrict this type of abuse by limiting access to only specific IP addresses that are trusted by using one of the built-in Linux Operating System tools?