question archive Given the following list of end-user policy violations and security breaches, identify strategies to control and monitor each event to mitigate risk and minimize exposure for EACH ONE SEPARATE: - Legitimate traffic bearing a malicious payload exploits network services
Subject:Computer SciencePrice:2.87 Bought7
Given the following list of end-user policy violations and security breaches, identify strategies to control and monitor each event to mitigate risk and minimize exposure for EACH ONE SEPARATE:
- Legitimate traffic bearing a malicious payload exploits network services.
- An invalid protocol header disrupts a critical network service.
- Removable storage drives introduce malware filtered only when crossing the network.
Answer:
Strategies For control and monitor malicious payload
* Always ensure the source is trustworthy before downloading any file from the internet
* Ensure a virus scan for all downloaded files
*Always check the validation of the certificate
*Aware about the phishing attack and do not click any link getting through mail .
Strategies For invalid protocol header
* use protocol constarints
* https is more secured protocol than http . use https
* check the validity of the certificate
Strategies For Removable storage drives
* Periodical assesment of the device should be carried out
* Encrypt the data using an strong encryption algoritham
*Run advanced virus scanning
* Only connect to the port/system that is trustworthy .