Goal: Implement procedures to monitor log-ins and report discrepancies related to this activity.
The purpose of this policy is to identify unauthorized attempts to penetrate systems thru the illicit use of existing users’ passwords.
Procedure: Whenever feasible the Security Manager shall use software to monitor log-in attempts into the systems.