A company recently moved sensitive videos between on-premises, company-owned websites.
The company then learned the videos had been uploaded and shared to the Internet.
Which of the following would MOST likely allow the company to find the cause?
A.
Checksums B.
Watermarks C.
Order of volatility D.
A log analysis E.
A right-to-audit clause.
E.
A company recently moved sensitive videos between on-premises, company-owned websites.
The company then learned the videos had been uploaded and shared to the Internet.
Which of the following would MOST likely allow the company to find the cause?
A.
Checksums
B.
Watermarks
C.
Order of volatility
D.
A log analysis
E.
A right-to-audit clause.
E.
The most likely way for the company to find the cause of sensitive videos being uploaded and shared on the Internet would be through a right-to-audit clause (Option E).
A right-to-audit clause is a provision in a contract that allows a company to audit its vendor or supplier's operations to ensure that the vendor is complying with the terms of the contract. In this case, the company could have a right-to-audit clause in the contract with the on-premises, company-owned websites that were responsible for transferring the sensitive videos.
By invoking the right-to-audit clause, the company could inspect the logs of the on-premises, company-owned websites to determine the source of the leak. The logs could contain information about who accessed the videos, when they were accessed, and from where. The company could use this information to identify the party responsible for uploading and sharing the videos on the Internet.
Checksums (Option A) are used to verify the integrity of files during transfer, but they would not be helpful in identifying who uploaded and shared the videos.
Watermarks (Option B) are used to identify the owner of a document or image, but they would not be helpful in this scenario as the company already knows that it owns the videos.
Order of volatility (Option C) is a methodology used in digital forensics to prioritize the collection of evidence based on its volatility. However, it would not be helpful in this scenario as the company needs to identify the source of the leak rather than collect evidence.
Log analysis (Option D) could be helpful in identifying the source of the leak, but it would be more effective if combined with a right-to-audit clause to gain access to the logs of the on-premises, company-owned websites.