I Believe answer should be D since it consistency monitoring using SIEM solution such as UEBA activities which will help to detect the deviation of the normal operation user is doing
Whoever decided on D as the answer has obviously never had to work in a company with a Works Council. This would never be approved as a first line of defence
I believe the order would be:
C validate the integrity of the people you are hiring, then:
B, you have a good access control
D, you monitor the activity
So the FIRST is C..
I believe the answer is B. The way I am reading it is they are already on boarded and hired and the vetting process did not work. So in that case you need access controls. The wording here makes it more difficult. Seems like a poorly written question and having two answers that could potentially be correct makes it even worse.
FIRST line of defense against criminal insider activities, it means the criminal is already doing something, so first line it's monitoring. The other options are not effective when insider is in action.
B. Stringent and enforced access controls are the FIRST line of defense against criminal insider activities.
Access controls are fundamental security measures that aim to restrict and manage access to critical systems, data, and resources within an organization. They are the primary means of preventing unauthorized individuals, including insiders with malicious intent, from accessing sensitive information or performing unauthorized actions.
Just remember that anyone in a company that's ever stolen or leaked data had previously passed that company's background checks. It's not enough. The ONLY defense is securing your system and it should be the first thing that's done.
A clear background check merely tells you that someone's never been caught...lol.
B. Stringent and enforced access controls.
Validating the integrity of personnel is an important measure in addressing insider threats, but it is not the first line of defense. While it is crucial to ensure that individuals with high levels of trust and integrity are hired and retained within an organization, relying solely on personnel validation may not be sufficient to prevent or detect criminal insider activities.
Implementing stringent and enforced access controls is considered the first line of defense because it focuses on controlling and limiting access to sensitive information and resources. Access controls help prevent unauthorized access and restrict individuals' privileges based on their roles and responsibilities.
What if the malicious user is an administrator who has the administrative privileges where he has the password and credentials login to the critical systems. does the answer B makes sense
Validating the integrity of personnel involves conducting thorough background checks, screening processes, and establishing trust in the individuals being hired or granted access to sensitive information or critical systems. By ensuring that individuals with a history of criminal activity or unethical behavior are not granted access to sensitive resources, organizations can mitigate the risk of insider threats.
What if the user become angry and frustrated employee and start doing the malicious or sabotage activities where he has administrative privileges or have trusted personal after working over 10 within the organization.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
lebigninpo
Highly Voted 1 year, 11 months agoZiggybooboo
1 year, 11 months agojaiz
1 year, 8 months agoAlexJacobson
10 months agooluchecpoint
9 months, 3 weeks agoD2D2
Highly Voted 1 year, 11 months agobuddhika2010
Most Recent 3 months agoGraceadel
7 months agoWibbleMyFins
7 months, 3 weeks agoMarcelus1714
8 months, 3 weeks agoAlexJacobson
10 months agoSalilgen
9 months agoblehbleh
10 months, 2 weeks agoSHERLOCKAWS
11 months, 1 week agoAlain_R
1 year, 2 months agoCyberbug2021
12 months agooluchecpoint
1 year, 2 months agoDavoA
1 year, 3 months agoGoseu
1 year, 4 months agosham222
1 year, 4 months agoJae_kes
1 year, 5 months agobuddhika2010
3 months agowello
1 year, 5 months agobuddhika2010
3 months agorichck102
1 year, 5 months ago