A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / kavish
Probably use a Keylogger , on every system !
whenever the programmer presses the keys of keyboard the
operations are stored in keylogger..
hence the surveillance system can be used ..
| Is This Answer Correct ? | 8 Yes | 0 No |
Post New Answer View All Answers
What are the different types of network security?
What is the difference between cybersecurity and information security?
What are the different type of networking / internetworking devices
Why do we use virtual private network?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
How does phishing work?
What are the different aspects of shadow it?
What are the main components of the CERT Taxonomy?
What factors would you consider before deploying a web intrusion detection system?
who is a hacker?
What is an information security management system (isms)?
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
If you need to encrypt and compress data for transmission, how would you achieve it?
What is the general data protection regulation (gdpr)?
What is Cross site scripting?