While reviewing an audit log, a financial institution employee notices that several attempts were made by a user to bypass the authentication process. The user attempted to log in ten times in twenty minutes using various methods, though the user never gained visible access. Which of the following describes what the employee should do next?

a. Nothing, the user did not gain access.
b. Clear the audit log, in case of error.
c. Continue to monitor the log until the user authenticates.
d. X Escalate the information to a security manager.

Respuesta :

In GDPR and other privacy laws, the data controller bears the most responsibility for protecting the privacy and rights of the data subject, such as a website user.

Simply put, the data controller is in charge of the procedures and purposes for which data is used. Depending on the type of data involved, the consequences can include database destruction or corruption, the leak of confidential information, intellectual property theft, and regulatory obligations to notify and possibly compensate those affected. For good data management, four major pillars must be considered: strategy and governance, standards, integration, and quality. Most importantly, an organization must embrace data as a corporate asset in order to be data-driven.

Learn more about data here-

https://brainly.com/question/10980404

#SPJ4

ACCESS MORE