Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is remote access vpn?

1004


How to implement PIX firewall security?

1006


What are the different aspects of shadow it?

1054


What is multicasting?

973


What is the idea behind the Bell-La Padula model?

2297


What is utm firewall?

1066


Name the port used by PING.

1015


Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

990


What is Imaging/ghosting?

1087


How do we use rsa for both authentication and secrecy?

978


Is vpn traffic encrypted?

1073


Diff bet ripv1 & ripv2?

985


How does a virtual private network (vpn) work?

1076


What are the possible ways of data exchange

1039


What is slowloris?

949