Customers’ credit card information was stolen from a popular video streaming company. A security consultant
determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor.
Which of the following methods should the company consider securing this data in the future?
Firmware version control
Encrypted TCP wrappers
Wrapping sensitive systems with a specific control is required when protecting data in transit. TCP wrappers
are also security controls. TCP Wrapper is a host-based networking ACL system, used to filter network access
to Internet Protocol servers on (Unix-like) operating systems such as Linux or BSD. It allows host or
subnetwork IP addresses, names and/or inetd query replies, to be used as tokens on which to filter for access
TCP Wrapper should not be considered a replacement for a properly configured firewall. Instead, TCP Wrapper
should be used in conjunction with a firewall and other security enhancements in order to provide another layer
of protection in the implementation of a security policy.