Why do we have to know how do you detect cyber threats?

previous post