ocr: Police Stake-out Surveillance. Camera A successful security policy: depends on monitoring. A variety of software eroentage of external access requests that are: tools can provide IS managers with continuous scrutiny, of security-related discourected oue 10 inproper password activities affecting their systens and networks. External hack attempts, failed log-ons, attempted internal accesses: to restricted files and other 25 potential threat signais can. be monitored in real time. Here is a sampler of a digital cop's armament: 20: 15 Radar Guns 105 Some of the: secunty-related 3 Hack Traffic atle ...