Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

909


What are manageable and non manageable switches?

1042


How does the HTTP handle state?

1049


How to you keep yourself updated on network security ?

1077


What is shadow it?

969


What is data loss prevention (dlp)?

983


What is multicasting?

961


What is remote access vpn?

995


What is adware?

1018


What factors would you consider before deploying a web intrusion detection system?

968


What are worms?

1012


What is network security?

990


What is RIS?

1027


Describe a TCP connection sequence

4458


What is Imaging/ghosting?

1065