A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / nimesh maru

This is answered with the CISSP perspective.
implement 1] Seperation of Duties : This will make sure that
one individual cannot complete a critical task by himself.
so we would have 2 ,3 or 4 people doing the 1 task.
Now if they want to do something malicious or unathorized
they all would have to come together to perform the task,
which detters the person from doing it. This act of all
people coming together to complete the task is also called
Collusion.

Further Seperation of duties shall be broken down in to
Split Know ledge and Dual Control.
Split Knowledge : No one person has complete knowledge of
performing one task or required information.
Dual control : here 2 or more individuals must be present
and active in participation to complete the task.

2]Job rotation : No One person should stay in one position
for long period of time as they would then have good
knowledge and would know inside out of entire process and
would be able to bypass or circumvent controls put in place
for the santity of the process and compliance.

Is This Answer Correct ?    1 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is difference between discretionary access control and mandatory access control?

561


How does ransomware work?

621


What is data loss prevention (dlp)?

564


What is the difference between cybersecurity and information security?

618


explain what is meant by port blocking within lan?

590






What is difference between baseband and broadband transmission

583


What is adware?

572


Explain for a small lan which class of addressing is used?

548


What is utm firewall?

585


How does a virtual private network (vpn) work?

558


What is ransomware?

567


What is the idea behind the Bell-La Padula model?

1808


Explain the difference between discretionary access control and mandatory access control?

551


What are the different aspects of shadow it?

550


What is remote access vpn?

574