A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are digital signatures and smart cards?
What is malware?
What is shadow it?
What is the idea behind the Bell-La Padula model?
What is intrusion prevention systems (ips)?
What is terminal emulation, in which layer it comes
What are the main components of the CERT Taxonomy?
What is Imaging/ghosting?
What is site-to-site vpn?
What is http flood?
What is RIS?
What is cybersecurity?
What is stateful inspection firewall?
What is an arp?
What is adware?