By distributing various information and monitoring centers that monitor
distributed networks and unauthorized access attempts, it is possible to,
for example, more quickly defend against an unauthorized access attempts.
For example, a Level 1 monitoring center could monitor a predetermined
geographical area serving, for example, a wide variety of commercial and
public sites, an organizational structure, or the like, for alarms. Upon
analyzing an alarm for various characteristics, the Level 1 monitoring
center can refer the unauthorized access attempt to an appropriate Level
2 center for, for example, possible retaliatory and/or legal action.
Then, a Level 3 monitoring center can record and maintain an overall
picture of the security of one or more networks, the plurality of
monitoring centers and information about one or more hacking attempts.