Customers’ credit card information was stolen from a popular video streaming company. A security
consultant determined that the information was stolen, while in transit, from the gaming consoles
of a particular vendor. Which of the following methods should the company consider to secure this
data in the future?
A.
Application firewalls
B.
Manual updates
C.
Firmware version control
D.
Encrypted TCP wrappers