A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is site-to-site vpn?

549


What is data loss prevention (dlp)?

568


What is shadow it?

578


What is Cross Site Request Forgery and how to defend against it?

597


Which are the different factors that affect the security of a network?

540






What is the idea behind the Bell-La Padula model?

1812


What is network access control?

626


What is classful and classless routing?

564


Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

546


What is slowloris?

572


What is the general data protection regulation (gdpr)?

558


How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

1893


How does network security work?

577


What is the difference between cybersecurity and information security?

620


How does ransomware work?

623