![]() 62
I
3
Application
Controls
and
service
--Hacking
'b.
Disaster recovery
plan
c. Insurance
Ron Weber
No. 33-35
Ron Weber
No. 36
Ron Weber
No. 37
Ron Weber
Boundary
a. Access controls
Ron Weber
No. 1-2
Controls
b. PIN
Ron Weber
No. 3-13
c. Plastic card
Ron Weber 1
No.l4
1
3.2
Input Controls
a
Data input
method
Ron Weber
No.1
b. Source
document
design
Ron Weber
No. 2-7
c. Data-entry
screen
design
Ron Weber
No. 8-12
d. Data code controls
Ron Weber
No.13
e. Validation
1?{ data input
Ron Weber
No.l4-17
f.Ir.struction
input
Ron Weber
No. 18
3.3
Communication
a.
Physical
component
Controls
controls
-. Transmission
media
Ron Weber
No. 1
_
_L_
'
-. Communication lines
_.
--------------------------- ---··
Ron Weber
No.2
|