Joe a website administrator believes he owns the intellectual property for a company invention and has been replacing image files on the company's public facing website in the DMZ. Joe is using steganography to hide stolen data.
Which of the following controls can be implemented to mitigate this type of inside threat?
xiaoyi
5 years, 1 month agoNot_My_Name
4 years, 8 months agoxtf5x
5 years, 1 month agoMagicianRecon
5 years ago