A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are digital signatures and smart cards?

561


What is malware?

568


What is shadow it?

575


What is the idea behind the Bell-La Padula model?

1808


What is intrusion prevention systems (ips)?

572






What is terminal emulation, in which layer it comes

559


What are the main components of the CERT Taxonomy?

3530


What is Imaging/ghosting?

613


What is site-to-site vpn?

547


What is http flood?

592


What is RIS?

598


What is cybersecurity?

612


What is stateful inspection firewall?

572


What is an arp?

586


What is adware?

572