Your company is concerned about potential unauthorized access to its internal network. As a cybersecurity professional, you suggest monitoring network traffic. Which type of monitoring should primarily be used to detect attempts to access the network from the outside?