A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

742


What is the difference between arp & rarp?

699


What are the possible ways of data exchange

799


What is subnet

792


Explain for a small lan which class of addressing is used?

736


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1316


What is mesh network

781


What is utm firewall?

773


who is a hacker?

791


What are the types fo ddos attacks?

774


How does a virtual private network (vpn) work?

756


What are the types of Transmission media

807


Why should you care about the OSI Reference Model

789


Explain how do we use rsa for both authentication and secrecy?

772


What is Cross Site Request Forgery and how to defend against it?

792