Watch this video on YouTube
Which user profiles should be of greatest concern to an IS auditor when auditing an EFT system?