
Ultimate access to all questions.
To enhance security by detecting insider threats or compromised accounts, an advanced anomaly detection system monitoring data access patterns is needed. Which approach integrates such a system with minimal performance and user experience impact?
A
Integrate an AI-powered security information and event management (SIEM) system that correlates data access logs with other security events for comprehensive anomaly detection.
B
Deploy a network traffic analysis tool that uses machine learning to identify unusual data access patterns indicative of a threat.
C
Utilize database audit logs, regularly analyzing them with an external machine learning system trained to recognize abnormal access patterns.
D
Implement an application-level monitoring solution that logs all data access requests and uses real-time analytics to detect anomalies.