Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
To enhance security by detecting insider threats or compromised accounts, an advanced anomaly detection system monitoring data access patterns is needed. Which approach integrates such a system with minimal performance and user experience impact?
A
Integrate an AI-powered security information and event management (SIEM) system that correlates data access logs with other security events for comprehensive anomaly detection.
B
Deploy a network traffic analysis tool that uses machine learning to identify unusual data access patterns indicative of a threat.
C
Utilize database audit logs, regularly analyzing them with an external machine learning system trained to recognize abnormal access patterns.
D
Implement an application-level monitoring solution that logs all data access requests and uses real-time analytics to detect anomalies.