Consider the risk to “integrity of customer and financial data files on system” from “corruption of these files due to import of a worm/virus onto a system,” as discussed in Problem 14.2 in your textbook. From the list shown in Table 15.3 in your textbook, select some suitable specific controls that could reduce this risk.