Joe a website administrator believes he owns the intellectual property for a company invention and has been replacing image files on the company's public facing website in the DMZ. Joe is using steganography to hide stolen data.Which of the following controls can be implemented to mitigate this type of inside threat?

A. Digital signatures
B. File integrity monitoring
C. Access controls
D. Change management
E. Stateful inspection firewall

Answer: B. File integrity monitoring

Computer Science & Information Technology

You might also like to view...

Pervasive risk is the amount of risk that remains to an information asset even after the organization has applied its desired level of controls. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol??

A. ?Kerberos B. ?TKIP C. ?AES D. ?EAP

Computer Science & Information Technology