This preview shows page 1. Sign up to view the full content.
Unformatted text preview: some employees were not checking his work. Required: A) What are the different ways that Blorneys employer could have prevented or detected unauthorized access to information or programs? B) Identify different types of controls that could be implemented in information systems environments. For each type of control, provide an example. [Note that points should be different from Part (A).]...
View Full Document
- Spring '09