The GREATEST risk when end users have access to a database at its system level, instead of through the application, is that the users can:
To determine who has been given permission to use a particular system resource, an IS auditor should review:
Which of the following is the PRIMARY safeguard for securing software and data within an information processing facility?