The document discusses the "Aurora Attack" on Google and other companies in 2009 by hackers in China. It then provides an overview of network security monitoring (NSM) including defining NSM, the role of computer incident response teams, capabilities of NSM, why intrusions can't always be prevented, and some drawbacks of NSM such as dealing with encrypted or high volume traffic.