A security engineer is reviewing a record of events after a recent data breach incident that involved the following:
✑ A hacker conducted reconnaissance and developed a footprint of the company's Internet-facing web application assets.
✑ A vulnerability in a third-party library was exploited by the hacker, resulting in the compromise of a local account.
✑ The hacker took advantage of the account's excessive privileges to access a data store and exfiltrate the data without detection.
Which of the following is the BEST solution to help prevent this type of attack from being successful in the future?
Mr_BuCk3th34D
Highly Voted 1 year, 4 months agohidady
1 year, 4 months agoMatty_B
1 year, 3 months agoSerliop378
1 year, 1 month agoAriel235788
7 months, 1 week agomansamusa
Most Recent 5 months agoAriel235788
7 months, 1 week agoimather
9 months, 1 week agoBiteSize
9 months, 3 weeks agodarkdumper
1 year agoBreakOff874
1 year agojosepa
1 year, 1 month agoFoxTrotDG
1 year, 1 month agoFOURDUE
1 year, 2 months agoFOURDUE
1 year, 2 months agohidady
1 year, 4 months ago