A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / kavish

Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the benefits of the firewall?

552


What are the main components of the CERT Taxonomy?

3535


Difference between the communication and transmission.

619


How does network security work?

578


What are the data units at different layers of the TCP / IP protocol suite

585






How to implement PIX firewall security?

548


What is Cross site scripting?

628


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

557


What are the different aspects of shadow it?

557


Is vpn traffic encrypted?

632


What is threat-focused ngfw?

528


What is difference between arp & rarp? How both of these protocols will work, and where it will use?

613


Explain what is the role of single sign on in authentication technologies?

599


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

528


What is difference between discretionary access control and mandatory access control?

562