A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
What is the difference between arp & rarp?
What are the possible ways of data exchange
What is subnet
Explain for a small lan which class of addressing is used?
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
What is mesh network
What is utm firewall?
who is a hacker?
What are the types fo ddos attacks?
How does a virtual private network (vpn) work?
What are the types of Transmission media
Why should you care about the OSI Reference Model
Explain how do we use rsa for both authentication and secrecy?
What is Cross Site Request Forgery and how to defend against it?