You have discovered that an employee has attached a modem to his telephone line and workstation. He has used this modem to dial in to his workstation, thereby bypassing your firewall. A security breach has occurred as a direct result of this activity. The employee explains that he used the modem because he had to download software for a department project. What can you do to solve this problem?
A.
Install a network-based IDS
B.
Reconfigure the firewall
C.
Conduct a needs analysis
D.
Enforce your security policy
Explanation:
The employee was unaware of security policy.