Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is cybersecurity?

1081


What is the general data protection regulation (gdpr)?

1119


What is ospf protocol

1111


How to you keep yourself updated on network security ?

1145


Difference between bit rate and baud rate.

1176


What is the difference between ripv1 & ripv2?

1043


What are the types fo ddos attacks?

1176


What are the types of LAN cables used? What is a cross cable?

1040


What is next-generation firewall (ngfw)?

1151


How to implement PIX firewall security?

1050


What are the possible ways of data exchange

1098


What is utm firewall?

1112


Explain how do we use rsa for both authentication and secrecy?

1066


What is network security?

1068


How do we use rsa for both authentication and secrecy?

1028