Discussion
Identify probable locations in the system for forgery, correctly apply input validation, and identify the access points into the system.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.