Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / kavish

Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the different types of network security?

1097


What is the difference between cybersecurity and information security?

1129


What are the different type of networking / internetworking devices

968


Why do we use virtual private network?

1062


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

972


How does phishing work?

978


What are the different aspects of shadow it?

1054


What are the main components of the CERT Taxonomy?

3968


What factors would you consider before deploying a web intrusion detection system?

972


who is a hacker?

1045


What is an information security management system (isms)?

1125


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

939


If you need to encrypt and compress data for transmission, how would you achieve it?

1112


What is the general data protection regulation (gdpr)?

1068


What is Cross site scripting?

1085