Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?
A.
Using antivirus software
B.
Implementing a firewall
C.
Limiting the open ports on the system
D.
Using an intrusion detection system