Which of the following monitoring methodologies will allow a technician to determine when there is a security related problem that results in an abnormal condition?