Explain why unauthorized remote access represents a risk to applications. Explain how incomplete, duplicate, and untimely processing can negatively impact applications. List seven common risks associated with EUD application systems. How can EUD applications become incompatible systems?