Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity. 1 . Authentication Failures: unauthorized access attempts 2. Network Abuses: Employees are downloading unauthorized material Part 2: Given a list of end-user policy violations and security breaches, select three reaches and consider best options for monitoring and controlling each incident.
Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. Open network drive shares allow storage privileges to outside users. A user made unauthorized use of network resources by attacking network entitles. 3. Removable storage drives introduce mallard.