A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / kavish
Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..
| Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
What is classful and classless routing?
What is a DNS resource record
What are digital signatures and smart cards?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
How does network security work?
What is ransomware?
How to implement PIX firewall security?
What are major types of networks and explain
Which are the different factors that affect the security of a network?
What protocol is used by DNS name servers
What is the difference between routable and non- routable protocols
What is proxy firewall?
What are the benefits of the firewall?
What do you do when you get blue screen in a computer? How do you troubleshoot it?
Explain how do we use rsa for both authentication and secrecy?