Unformatted text preview: some employees were not checking his work. Required: A) What are the different ways that Blorney’s employer could have prevented or detected unauthorized access to information or programs? B) Identify different types of controls that could be implemented in information systems environments. For each type of control, provide an example. [Note that points should be different from Part (A).]...
View Full Document
- Spring '09
- Computer program, John Blorney, unauthorized currency trades