What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detection System?