11) Computer crime
is defined as "any criminal activity involving the copy of, use of, removal of, interference with, access to, manipulation of computer systems, and/or their related functions, data or programs."
12) Identity theft is a crime in which an imposter obtains key pieces of personal information, such as social insurance numbers, driver's licence numbers, or credit card numbers, to impersonate someone else.
13) Pharming redirects users to a bogus Web page, even when the individual types the correct Web page address into his or her browser.
14) One increasingly popular tactic is a form of spoofing called phishing.
15) Social Bookmarking is tricking people into revealing their passwords or other information by pretending to be legitimate users or members of a company in need of information.
16) Software errors are no threat to information systems, that could cause untold losses in productivity.
17) Many firms spend heavily on security because it is directly related to sales revenue.
18) Computer forensics
is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
19) General controls govern the design, security, and use of computer programs and the security of data files throughout the organization's IT infrastructure.
20) Application controls
are specific controls unique to each computerized application, such as payroll or order processing.