A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is cybersecurity?
What is the general data protection regulation (gdpr)?
What is ospf protocol
How to you keep yourself updated on network security ?
Difference between bit rate and baud rate.
What is the difference between ripv1 & ripv2?
What are the types fo ddos attacks?
What are the types of LAN cables used? What is a cross cable?
What is next-generation firewall (ngfw)?
How to implement PIX firewall security?
What are the possible ways of data exchange
What is utm firewall?
Explain how do we use rsa for both authentication and secrecy?
What is network security?
How do we use rsa for both authentication and secrecy?