December 22, 2021 by Admin
During a review of information security procedures for disabling user accounts, an IS auditor discovers that IT is only disabling network access for terminated employees. IT management maintains if terminated users cannot access the network, they will not be able to access any applications. Which of the following is the GREATEST risk associated with application access?
- Unauthorized access to data
- Inability to access data
- Lack of segregation of duties
- Loss of non-repudiation