Jodi needs to protect her company's network from internal threats. What methods can she use?
require employees to change passwords weekly
add more peripherals
use broadband services
establish access privileges
require logins for network access