A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / kavish
Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..
| Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
What is intrusion prevention systems (ips)?
What is difference between baseband and broadband transmission
What are the types of phishing attacks?
What is utm firewall?
Explain the difference between discretionary access control and mandatory access control?
What is Cross Site Request Forgery and how to defend against it?
What is terminal emulation, in which layer it comes
What is the general data protection regulation (gdpr)?
Difference between the communication and transmission.
What are the different type of networking / internetworking devices
What is Cross site scripting?
What is cybersecurity?
What are all the technical steps involved when the data transmission from server via router?
What is subnet
What is slowloris?