question archive Given the following list of end-user policy violations and security breaches, identify strategies to control and monitor each event to mitigate risk and minimize exposure for EACH ONE SEPARATE: - Legitimate traffic bearing a malicious payload exploits network services

Given the following list of end-user policy violations and security breaches, identify strategies to control and monitor each event to mitigate risk and minimize exposure for EACH ONE SEPARATE: - Legitimate traffic bearing a malicious payload exploits network services

Subject:Computer SciencePrice:2.87 Bought7

Given the following list of end-user policy violations and security breaches, identify strategies to control and monitor each event to mitigate risk and minimize exposure for EACH ONE SEPARATE:

Legitimate traffic bearing a malicious payload exploits network services.

- An invalid protocol header disrupts a critical network service.

- Removable storage drives introduce malware filtered only when crossing the network.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Answer:

Strategies For control and monitor malicious payload

* Always ensure the source is trustworthy before downloading any file from the internet

* Ensure a virus scan for all downloaded files

*Always check the validation of the certificate

*Aware about the phishing attack and do not click any link getting through mail .

Strategies For invalid protocol header

* use protocol constarints

* https is more secured protocol than http . use https

* check the validity of the certificate

Strategies For Removable storage drives

* Periodical assesment of the device should be carried out

* Encrypt the data using an strong encryption algoritham

*Run advanced virus scanning

* Only connect to the port/system that is trustworthy .

Related Questions