Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / kavish

Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is classful and classless routing?

1057


How to you keep yourself updated on network security ?

1145


What type of network do you use at home?

1074


What is a ddos attack?

978


What is malware?

1077


What is the difference between routable and non- routable protocols

1118


What is data loss prevention (dlp)?

1050


What is information security?

1272


Why should you care about the OSI Reference Model

1079


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1673


What is ransomware?

1043


What is threat-focused ngfw?

988


What is adware?

1075


What is network access control?

1133


What is meant by port blocking within lan?

1100