Which of the following user profiles should be of MOST concern to an IS auditor when performing an audit of an EFT system?
A.
Three users with the ability to capture and verify their own messages
B.
Five users with the ability to capture and send their own messages
C.
Five users with the ability to verify other users and to send their own messages
D.
Three users with the ability to capture and verify the messages of other users and to send their own messages
Explanation:
The ability of one individual to capture and verify messages represents an inadequate segregation, since messages can be taken as correct and as if they had already been verified.