A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is http flood?

594


Is vpn traffic encrypted?

635


What are worms?

572


Explain what is the role of single sign on in authentication technologies?

601


What is terminal emulation, in which layer it comes

564






What a security mean in your sense?

629


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

489


What is threat-focused ngfw?

528


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

557


Difference between the communication and transmission.

621


What type of network do you use at home?

613


Define the meaning of an Authentication.

610


What is IPCONFIG command? Why it is used?

580


What is difference between baseband and broadband transmission

589


What is frame relay, in which layer it comes

604