Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

who is a hacker?

997


What are the possible ways of data exchange

994


What are the types of LAN cables used? What is a cross cable?

946


How does the HTTP handle state?

1010


What are major types of networks and explain

1057


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

881


What is IPCONFIG command? Why it is used?

1161


What is ospf protocol

986


What is difference between discretionary access control and mandatory access control?

946


What is mesh network

978


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1584


Describe a TCP connection sequence

4420


What is the general data protection regulation (gdpr)?

1013


Explain what is the role of single sign on in authentication technologies?

1004


What is kerberos protocol?

993