124k views
2 votes
A cybersecurity analyst implements security measures for a financial institution's infrastructure. The analyst explores different technologies to enhance security and must select the appropriate technology to strengthen security within the organization's infrastructure. Which technology should the cybersecurity analyst choose to enhance security for executing sensitive operations and protecting critical data in the financial institution's infrastructure?

A. Encryption Technology: Utilizing algorithms to encode sensitive information to prevent unauthorized access.

B. Firewall System: Implementing a barrier between internal networks and external sources to control incoming and outgoing traffic.

C. Intrusion Detection System (IDS): Monitoring network or system activities for signs of malicious activities or security policy violations.

D. Multi-Factor Authentication (MFA): Requiring users to provide multiple forms of identification before granting access to sensitive operations.

E. Virtual Private Network (VPN): Creating a secure connection over the internet to ensure the confidentiality of data transmission.

1 Answer

2 votes

Final answer:

To bolster security in a financial institution's infrastructure, a cybersecurity analyst should implement Multi-Factor Authentication (MFA) to require multiple identification forms before access is granted, although a combination of security technologies is recommended for comprehensive protection.

Step-by-step explanation:

To enhance security for executing sensitive operations and protecting critical data in the financial institution's infrastructure, a cybersecurity analyst should consider implementing a combination of technologies rather than relying on a single solution. However, if one must be chosen, Multi-Factor Authentication (MFA) stands out as a crucial technology. MFA adds an extra layer of security by requiring users to provide multiple forms of identification before being granted access, which significantly reduces the risk of unauthorized access.

Although MFA is essential, incorporating other technologies such as Encryption Technology to encode sensitive information, Firewall Systems to monitor and control network traffic, and Intrusion Detection Systems (IDS) for continuous monitoring of malicious activities, can provide a comprehensive defense-in-depth strategy. It is also important to consider human factors, such as the cognitive load on security operators and the need for continuous education to avoid scams and identify threats accurately, as part of the cybersecurity program.

With the increase in sophisticated cyber-attacks, as seen with incidents at major retailers and financial institutions, prioritizing the strengthening of security measures and personal data protection is more critical than ever. By using evidence-based practices and well-defined policies, financial institutions can work towards achieving a more secure environment that protects sensitive operations and critical data.

User Haddr
by
7.6k points