1. Discuss how a controlled SPL environment can help to deter unauthorized changes to programs.
Can the use of maintenance commands mitigate these controls?
2. What types of output would be considered extremely sensitive in a university setting? Give three examples and explain why the information would be considered sensitive. Discuss who should and should not have access to each type of information.