(46)Under Application Controls, maintains the chronology of events that occur when a user attempts to gain access to and employ systems resources.
(46)Under Application Controls, maintains
the chronology of events that occur when a user attempts to gain access to and
employ systems resources.
(a)Boundary Controls
(b)Input Controls
(c)Communication Controls
(d)Processing Controls