A security consultant is investigating acts of corporate espionage within an organization. Each
time the organization releases confidential information to high-ranking engineers, the information
is soon leaked to competing companies. Which of the following techniques should the consultant
use to discover the source of the information leaks?
A.
Digital watermarking
B.
Steganography
C.
Enforce non-disclosure agreements
D.
Digital rights management