RECOGNIZE THE PROMPT IMPORTANCE OF APPLYING EFFECTIVE BUG MONITORING METHODS DURING A SUDDEN INTRUSION