A hacker could obtain passwords without the use of computer tools or programs through the technique of:
Which of the following user profiles should be of MOST concern to an IS auditor when performing an audit of an EFT system?