A security analyst working on a monitoring team wants to implement new monitoring mechanisms around secure shell (SSH) authentication. Which of the following should the analyst focus on?
a) Monitoring failed SSH login attempts
b) Monitoring SSH key usage and management
c) Monitoring SSH protocol versions and configurations
d) Monitoring SSH session durations