During a physical-security penetration test of a precision-electronics manufacturer, you interview the facilities manager about the site's 150 IP cameras. Footage is streamed to password-protected shares on a segmented surveillance VLAN, mirrored to an encrypted off-site vault each night, and retained for seven years. Executives explain that the recordings must be admissible evidence in future patent-infringement or safety-liability cases, so any manipulation-such as frame deletion or video splicing-must be provable. After reviewing the existing architecture, which additional control would MOST directly allow internal auditors or outside counsel to confirm that a particular video clip is the original, unaltered recording?
Attach a cryptographic hash or digital signature to every recorded segment and validate it before playback
Deploy continuous data-loss-prevention (DLP) monitoring on the camera VLAN to flag suspicious traffic
Upgrade the network-attached storage with self-encrypting drives and extend retention periods
Restrict camera streams to the highest-priority work cells to reduce the amount of stored footage
Applying a cryptographic hash or digital signature to each video segment creates a unique, tamper-evident marker. When the clip is later accessed, the system recalculates the hash and compares it to the stored value; any alteration changes the hash, immediately revealing corruption. Password-protected storage, network segmentation, off-site archiving, or footage reduction improve confidentiality, availability, or storage efficiency but do not, by themselves, prove integrity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic hash, and how does it work?
Open an interactive chat with Bash
What is the difference between a cryptographic hash and a digital signature?
Open an interactive chat with Bash
Why is data integrity essential for admissible evidence in legal cases?