A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is site-to-site vpn?
What is data loss prevention (dlp)?
What is shadow it?
What is Cross Site Request Forgery and how to defend against it?
Which are the different factors that affect the security of a network?
What is the idea behind the Bell-La Padula model?
What is network access control?
What is classful and classless routing?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is slowloris?
What is the general data protection regulation (gdpr)?
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
How does network security work?
What is the difference between cybersecurity and information security?
How does ransomware work?