Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / kavish

Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..

Is This Answer Correct ?    8 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is intrusion prevention systems (ips)?

951


What is difference between baseband and broadband transmission

1069


What are the types of phishing attacks?

1037


What is utm firewall?

1017


Explain the difference between discretionary access control and mandatory access control?

916


What is Cross Site Request Forgery and how to defend against it?

972


What is terminal emulation, in which layer it comes

974


What is the general data protection regulation (gdpr)?

1000


Difference between the communication and transmission.

933


What are the different type of networking / internetworking devices

905


What is Cross site scripting?

1027


What is cybersecurity?

990


What are all the technical steps involved when the data transmission from server via router?

984


What is subnet

1001


What is slowloris?

897