Alice, a system administrator, notices that some sensitive files have been accessed by unauthorized users. She wants to ensure that, in the future, only specific users can view and modify these files. What security measure should Alice implement?
- Access Control List (ACL)
- Encryption
- Intrusion Detection System (IDS)
- Two-Factor Authentication (2FA)
Alice should implement Access Control Lists (ACLs) to restrict file access. ACLs define which users or system processes are granted access to objects, as well as what operations are allowed on given objects. In this case, Alice can specify which specific users have access to sensitive files and what type of access they have.
Loading...
Related Quiz
- A common technique used by attackers where they trick users into revealing their passwords by pretending to be legitimate tech support is called _______.
- DLP solutions often use _______ to detect sensitive data based on predefined criteria.
- Sarah, an IT administrator, notices that several unauthorized devices have been connecting to the company's wireless network. To ensure only company devices can connect, she considers implementing a security measure based on hardware addresses. Which security measure is she thinking of?
- How does a network-based IDS (NIDS) differ from a host-based IDS (HIDS)?
- Which cryptographic technique ensures that the content of a message or document has not been altered during transmission?