|
MacWheel99@aol.com wrote: > <snip> > > A developer who is given full access to our corporate systems can also play > the role of an embezzler ... enter a dummy vendor ... enter dummy debts ... > set up the system to send off payments to the dummy vendor (developer secret > account). Security is great for preventing malicious attacks, but the more realistic (and frequent) use of security is that it often prevents regular folks from making disasterous mistakes. You can accidently corrupt the production inventory file if you don't have direct write authority to it. jte -- John Earl johnearl@400security.com The PowerTech Group --> new number --> 253-872-7788 PowerLock Network Security www.400security.com -- +--- | This is the Midrange System Mailing List! | To submit a new message, send your mail to MIDRANGE-L@midrange.com. | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com. | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com. | Questions should be directed to the list owner/operator: david@midrange.com +---
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.