194k views
0 votes
The security team at a multinational cloud services company is working on their port security. They implemented basic Media Access Control (MAC) address filtering on all switch ports, but they have concerns about the risk of MAC spoofing and the management overhead of maintaining a list of valid MAC addresses. To address these concerns, they now require strong authentication before a user can obtain full network access. Which of the following measures should the team implement next?

a. Intrusion Detection System (IDS)
b. Virtual Private Network (VPN)
c. Public Key Infrastructure (PKI)
d. Two-factor authentication (2FA)

User KenIchi
by
7.7k points

1 Answer

2 votes

Final answer:

The next measure the security team should implement is Two-factor authentication (2FA). 2FA adds an extra layer of security by requiring users to provide two forms of identification before gaining access to the network. Additionally, other measures such as Virtual Private Network (VPN) and Intrusion Detection System (IDS) can further enhance the security of the network.

Step-by-step explanation:

The next measure the security team should implement is Two-factor authentication (2FA).

Two-factor authentication adds an extra layer of security by requiring users to provide two forms of identification before gaining access to the network. This could involve a combination of something the user knows (such as a password) and something the user owns (such as a smartphone or hardware token). By implementing 2FA, the company can significantly reduce the risk of unauthorized access and mitigate the concerns of MAC spoofing and maintaining a list of valid MAC addresses.

Additionally, other measures such as Virtual Private Network (VPN) and Intrusion Detection System (IDS) can further enhance the security of the network. A VPN creates a secure connection between the user's device and the company's network, protecting data transmission from eavesdropping and unauthorized access. An IDS helps monitor network traffic and identify potential security breaches or malicious activities.

User Meisha
by
8.2k points