A 0 Use digital rights management in addition to other identity management and access control capabilities. B 0 Set filters and rules on network traffic, inspecting suspicious packets, streams, or addresses to check for data being exfiltrated. C 0 D 0 Analyze access control and resource usage log data to alert when abnormal patterns of behavior are noted. Alert when failed attempts to access a resource (whether it is protected by encryption or not) exceed a specified limit.
A 0 Use digital rights management in addition to other identity management and access control capabilities. B 0 Set filters and rules on network traffic, inspecting suspicious packets, streams, or addresses to check for data being exfiltrated. C 0 D 0 Analyze access control and resource usage log data to alert when abnormal patterns of behavior are noted. Alert when failed attempts to access a resource (whether it is protected by encryption or not) exceed a specified limit.
Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter2: Compliance: Law And Ethics
Section: Chapter Questions
Problem 14RQ
Related questions
Question
what are some effective,practical strategies to detect data exfiltration attacks? (choose all that apply.)
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by step
Solved in 3 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,
Enhanced Discovering Computers 2017 (Shelly Cashm…
Computer Science
ISBN:
9781305657458
Author:
Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:
Cengage Learning
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781285867168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning