Question

In: Computer Science

An information security officer reviews a report and notices a steady increase in outbound network traffic...

An information security officer reviews a report and notices a steady increase in outbound network traffic over the past ten months There is no clear explanation for the increase The security officer interviews several business units and discovers an unsanctioned cloud storage provider was used to share marketing materials with potential customers Which of the following services would be BEST for the security officer to recommend to the company?

  1. NIDS

  2. HIPS

  3. CASB

  4. SFTP

Solutions

Expert Solution

Answer)
Here the situation is that the information security officer notices an increase in the outbound network traffic due to probable unsanctioned cloud storage provider which was used for sharing the marketing materials with potential customers, thus here the best option for the security officer would be:
CASB

SFTP is a file transfer protocol, thus is not specific to security, NIDS and HIPS are intrusion prevention system but here the steady increase in outbound network traffic is there thus these are not the recommended option. The cloud access security broker CASB is the solution that is needed here which will sit between the cloud service users and cloud applications and will thus be used to monitor the activity and also enforce the security policies.

**Please Hit Like if you appreciate my answer. For further doubts on the answer please drop a comment, I'll be happy to help. Thanks for posting.**


Related Solutions

As you increase the security of your network, you are concerned that the added security measures...
As you increase the security of your network, you are concerned that the added security measures may impact in ways you had not intended. For example, how could a firewall have a negative impact on business from the following list? Explain It can filter packets from a site known to cause DoS attacks. It can filter packets that have a virus signature. It can block traffic that should be allowed through. It can log every packet that is transmitted.
Analyzing network traffic and understanding packets is an important task for IT security professionals. Illegitimate hackers...
Analyzing network traffic and understanding packets is an important task for IT security professionals. Illegitimate hackers also use network traffic to steal information and/or to about an organization's network infrastructure. How can different methods of packet capture be useful and why might one be chosen over another? How can understanding of the OSI model inform a discussion of packet capture?
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
Report on hiding information and watermarks in Data security technologies?.
Report on hiding information and watermarks in Data security technologies?.
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to...
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to conduct a Web application penetration test on your network. Identify and explain all steps necessary to successfully complete the test.
The following information is taken from the 2019 Traffic Safety Report for Jefferson county. It looks...
The following information is taken from the 2019 Traffic Safety Report for Jefferson county. It looks at all collisions with animals and splits them up into two categories: collisions with domestic animals and collisions with wild animals. Year Domestic Animal Wild Animal Total 2015 4 28 32 2016 6 29 35 Total 10 58 67 Your friend says they got in a crash with an animal and they are about to tell you a story. Match each phrase to it's...
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A....
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A. The Chief Financial Officer (CFO) calls you wondering what should have been done differently during a recent incident involving your predecessor. The following incidents recently occurred and were closed out without any alert to senior staff or the CFO. The Chief Financial Officer’s admin reported that their laptops were performing erratically and many popup screens kept appearing while browsing the Internet. Upon inspection, it...
Network Security Consider a financial report publishing system used to produce reports for various organizations i....
Network Security Consider a financial report publishing system used to produce reports for various organizations i. Give an example of a type of publication in which confidentiality of the stored data is the most important requirement ii. Give an example of a type of publication in which data integrity is the most important requirement iii. Give an example in which system availibility is h most important requirement
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5...
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.. Your Task
 Step 2: Develop the Authorized Uses section of your ISP In this week’s Lab you will develop...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT