This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are conducting an audit to assess the controls in place that mitigate attacks involving the redirection of Internet traffic to unauthorized websites. What specific control measure would be the best choice to implement in order to address this potential security threat effectively?