An automated vulnerability assessment report indicates the presence of insecure encryption protocols on the web server hosting an online storefront. Further investigation reveals the server is configured to permit the use of algorithms susceptible to decryption attacks. Which of the following recommendations should the security analyst make to enhance the secure transmission of data?
Turn off encryption on the server to bypass the complexity of configuring protocols until a permanent solution is devised.
Perform an immediate update of the web platform software to the most current release to address any underlying vulnerabilities.
Modify the server configuration to enforce the use of strong encryption algorithms and eliminate support for the outdated and insecure ones.
Renew the digital certificates associated with the server, as they might be contributing to the vulnerability.
|Incident Response and Management
|Reporting and Communication