Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

A System programmer have access to computer room, it is
possible that he may undertake some unauthorised activities
at any time, due to his deep knowledge how can a control
build to avoid the risk?

Answer Posted / beginner

Limitation Of Access for the user, log generator should be
implemented in order to view the activities of the user.
Configuring proper firewalls nd blocking the unused ports.
Configuring the router by giving limited access to the user
are some of the ways

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is BSOD?

962


What are the types of Transmission media

1030


What is remote access vpn?

947


What is the role of single sign on in authentication technologies?

964


Is vpn traffic encrypted?

1019


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

861


What is trojan virus?

948


who is a hacker?

990


How to implement PIX firewall security?

945


How to you keep yourself updated on network security ?

1031


Name the port used by PING.

968


Difference between the communication and transmission.

936


What is Cross Site Request Forgery and how to defend against it?

975


What is mesh network

969


What is meant by port blocking within lan?

952