What is an Intrusion Detection System (IDS)? Monitor Cyber Threats Effectively