A review of Internet security disclosed that users have individual user accounts with the Internet service providers (ISPs) and use these accounts for downloading business data.
The organization wants to ensure that only corporate network is used.
The organization should FIRST:
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The organization wants to ensure that only the corporate network is used for downloading business data, while users have individual user accounts with the Internet Service Providers (ISPs). This scenario raises concerns about the security of the corporate network, as sensitive business data could be downloaded onto unsecured external devices or networks.
To address this concern, the organization should FIRST consider implementing a solution that restricts access to the corporate network for downloading business data from the Internet. Of the options provided, the most effective solution is to use a proxy server to filter out Internet sites that should not be accessed.
Option A is the correct choice, as it provides a means of controlling access to the Internet by filtering out unauthorized sites, and thereby prevents users from accessing non-business-related websites or services that could compromise the security of the corporate network.
Option B, keeping a manual log of internal access, would not be effective in controlling access to the Internet or preventing users from accessing non-business-related websites or services.
Option C, monitoring remote access activities, is important for detecting and preventing unauthorized access to the corporate network, but it would not be effective in controlling access to the Internet or preventing users from accessing non-business-related websites or services.
Option D, including a statement in the security policy about Internet use, is important but is not a complete solution in itself. A policy statement alone does not provide a mechanism for enforcing the policy, and it may not be sufficient to prevent users from accessing non-business-related websites or services.
In summary, the organization should FIRST use a proxy server to filter out Internet sites that should not be accessed, as this provides an effective means of controlling access to the Internet and preventing users from accessing non-business-related websites or services that could compromise the security of the corporate network.