1. What is the theft triangle, and why is it important to understand when developing procedural controls aimed at decreasing the incidence of employee theft?
2. Explain when a polygraph test may be used on current employees.
3. Identify the three methods that computer systems can use to determine whether a person has a legitimate right to access the system, and discuss what each method means.