An information security team has discovered that users are sharing a login account to an application with sensitive information, in violation of the access policy. Business management indicates that the practice creates operational efficiencies. The information security manager's BEST course of action should be to:
An IS auditor finds that, in accordance with IS policy, IDs of terminated users are deactivated within 90 days of termination. The IS auditor should:
A database administrator (DBA) should be prevented from having end user responsibilities:
When developing a risk-based IS audit plan, the PRIMARY focus should be on functions:
Which of the following procedures would BEST contribute to the reliability of information in a data
warehouse?