Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answers were Sorted based on User's Feedback



A System programmer have access to computer room, it is possible that he may undertake some unauth..

Answer / kavish

Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..

Is This Answer Correct ?    8 Yes 0 No

A System programmer have access to computer room, it is possible that he may undertake some unauth..

Answer / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No

A System programmer have access to computer room, it is possible that he may undertake some unauth..

Answer / nimesh maru

This is answered with the CISSP perspective.
implement 1] Seperation of Duties : This will make sure that
one individual cannot complete a critical task by himself.
so we would have 2 ,3 or 4 people doing the 1 task.
Now if they want to do something malicious or unathorized
they all would have to come together to perform the task,
which detters the person from doing it. This act of all
people coming together to complete the task is also called
Collusion.

Further Seperation of duties shall be broken down in to
Split Know ledge and Dual Control.
Split Knowledge : No one person has complete knowledge of
performing one task or required information.
Dual control : here 2 or more individuals must be present
and active in participation to complete the task.

2]Job rotation : No One person should stay in one position
for long period of time as they would then have good
knowledge and would know inside out of entire process and
would be able to bypass or circumvent controls put in place
for the santity of the process and compliance.

Is This Answer Correct ?    1 Yes 2 No

Post New Answer

More Networking Security Interview Questions

What are manageable and non manageable switches?

0 Answers  


Diff bet ripv1 & ripv2?

0 Answers  


What is a ddos attack?

0 Answers  


How does phishing work?

0 Answers  


Explain what is the role of single sign on in authentication technologies?

0 Answers  


Why do we use virtual private network?

0 Answers  


What is the difference between arp & rarp?

0 Answers  


SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)

4 Answers   SAP Labs,


What is difference between baseband and broadband transmission

0 Answers   Elgi Equipments,


What is the purpose of a firewall?

4 Answers  


What is the difference between a virus and malware?

0 Answers  


What is network access control?

0 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)