Explain how an Enterprise Risk Management process could help manage the IT risks of a company? Name 2 controls within the system development life cycle, and explain how they could support the control objective of IT integrity. Name 2 controls that could prevent unauthorized access to your computer system, and explain how they could support the control objective of IT security. Name 2 controls within the computer centre or computer operations, and explain how they could support the control objective of IT availability. What is the difference between logical and physical security? .