The methods by which security systems monitor and respond to potential attacks or unauthorized access attempts.