1. National Institute of Standards and Technology (NIST) Special Publication 800-53, Revision 5, "Security and Privacy Controls for Information Systems and Organizations."
Reference: Control AC-7, "Unsuccessful Logon Attempts."
Content: This control explicitly requires the system to enforce actions (e.g., locking an account/node) after a specified number of consecutive unsuccessful logon attempts. This underscores the principle that monitoring these attempts is a critical security control for identifying and responding to potential attacks.
2. CIMA Professional Qualification Syllabus, P3 – Risk Management (2019).
Reference: Section B: Enterprise Risk, 2. (c) "Discuss the sources, and impact of, information systems risks..."
Content: The syllabus requires candidates to understand risks related to information systems, including unauthorized access. A key control to manage this risk is monitoring access logs, with a particular focus on anomalies like repeated failed attempts, which is a direct symptom of a potential breach.
3. Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in Computing (5th ed.). Prentice Hall.
Reference: Chapter 4, "Authentication," Section 4.3 "Passwords."
Content: The text discusses password-guessing attacks and countermeasures. It highlights that "a simple countermeasure is to log all failed login attempts... A security administrator can review the log, looking for suspicious patterns." This confirms that monitoring failed attempts is a standard and effective security practice.