72.1k views
3 votes
Which of the following mitigation strategies might be effective in handling threats caused by network monitoring?

Logging and auditing
Access Control
Filtering
Encryption

User Sandrew
by
8.3k points

1 Answer

5 votes

Final answer:

Effective mitigation strategies for threats caused by network monitoring include encryption, access control, logging and auditing, and filtering. Encryption ensures data privacy, while access control limits resource accessibility to authorized users. Logging and auditing provide insights into network activity.

Step-by-step explanation:

When handling threats caused by network monitoring, one effective mitigation strategy is the use of encryption. Encryption scrambles the data transmitted over the network, making it unreadable to unauthorized individuals who might be monitoring the network. This ensures the confidentiality and integrity of the information. Access control is another crucial strategy that restricts access to network resources and data. By implementing robust access control policies, only authorized users are allowed to access certain information, reducing the risk of sensitive data being intercepted during transmission.

While logging and auditing do not prevent monitoring, they are important for detecting and analyzing unauthorized network activities, which can indicate the presence of monitoring. Therefore, they are essential components of a comprehensive mitigation plan. Filtering, such as the use of intrusion prevention systems, can also be beneficial by blocking unauthorized traffic and potentially harmful data from entering the network.

User Michael Alan Huff
by
8.3k points