Management finds several unmarked storage devices scattered on a vacant desk. They suspect this is an attempt to lure employees to check their contents. Which option reduces the likelihood of staff usage?
Implement a guideline requiring employees to hand over such items for forensic analysis in a secured environment
Sanitize them with a standard cleanup tool and hand them back to employees
Recommend that staff verify the contents on personal machines before using them on company computers
Store them in a common area so staff can review at their own discretion
Encouraging staff to turn in unmarked devices to an incident response team for analysis dissuades employees from risking infection or data breaches. Using a secured analysis environment prevents direct exposure to production systems. Plugging devices into personal PCs, wiping them casually, or leaving them readily accessible undermines a controlled approach to handling potential threats and raises further security concerns.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is it important to analyze unmarked storage devices in a secured environment?
Open an interactive chat with Bash
What tools or methods are used to perform forensic analysis on storage devices?
Open an interactive chat with Bash
What are the risks of plugging unknown devices into personal or company systems?