Customers’ credit card information was stolen from a popular video streaming company. A
security consultant determined that the information was stolen, while in transit, from the
gaming consoles of a particular vendor. Which of the following methods should the company
consider to secure this data in the future?
A.
Application firewalls
B.
Manual updates
C.
Firmware version control
D.
Encrypted TCP wrappers