Comprehensive Guide to Threat Detection and Response: Protecting Your Digital Assets