A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / kavish
Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..
Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
What are the benefits of the firewall?
What are the main components of the CERT Taxonomy?
Difference between the communication and transmission.
How does network security work?
What are the data units at different layers of the TCP / IP protocol suite
How to implement PIX firewall security?
What is Cross site scripting?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What are the different aspects of shadow it?
Is vpn traffic encrypted?
What is threat-focused ngfw?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
Explain what is the role of single sign on in authentication technologies?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
What is difference between discretionary access control and mandatory access control?