Article 24
|
(Monitoring of the Information and Communication System)
- A report shall be made to specific personnel of an organization if the information and communication system shows signs of being hacked.
- An organization shall monitor the core systems to detect attacks and unauthorized connection and identify any unauthorized use of the information and communication system. Monitoring of non-core systems is advised.
- It is advisable for a core system to monitor traffic using automation tools and analyse any unusual or unauthorized activity discovered.
|