1. Why is human behavior considered one of the biggest potential threats to operating system integrity?
2. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks?
3. Discuss the issues that need to be considered before implementing keystroke monitoring.
4. Explain how an access token and an access control list are used to approve or deny access.