A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?
Answer Posted / beginner
Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
What are manageable and non manageable switches?
How does the HTTP handle state?
How to you keep yourself updated on network security ?
What is shadow it?
What is data loss prevention (dlp)?
What is multicasting?
What is remote access vpn?
What is adware?
What factors would you consider before deploying a web intrusion detection system?
What are worms?
What is network security?
What is RIS?
Describe a TCP connection sequence
What is Imaging/ghosting?