
A Global Approach to Cybersecurity 339
In order to meet the need for monitoring and reaction, auditing mechanisms
should be designed and implemented in and around critical systems. These
mechanisms should report violations of a de ned policy or report actions that
are considered to be security threats.
The use of strong identi cation and authentication solutions, operational
cryptographic mechanisms, and one-time passwords are strongly recom-
mended to enforce network security. Automated or semiautomatic techniques
for guiding the selection of mechanisms for enforcing security policies and
rules previously de ned must also be envisaged.