iated permissions, and tracks failed authentication attempts for intrusion detection security3.2.5 Algorithms for authorizing individual users/customers to access and use only their devices and associated data3.2.6 Algorithms for detecting when security might be compromised anywhere in the system and taking action once security is believed to be compromised such as locking out a user or customer,