149) ________ defects cannot be achieved in larger programs.
150) Many firms are reluctant to spend heavily on security because it is not directly related to ________.
151) ________ controls are specific controls unique to each computerized application, such as payroll or order processing.
152) ________ controls establish that data are complete and accurate during updating.
153) ________ controls ensure that the results of computer processing are accurate, complete, and properly distributed.
154) A ________
determines the level of risk to the firm if a specific activity or process is not properly controlled.
155) A ________ includes statements ranking information risks, identifying acceptable security goals, and identifying the mechanisms for achieving these goals.
156) An ________ defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet.
157) ________
devises plans for the restoration of computing and communications services after they have been disrupted.
158) A ________
is a physical device, similar to an identification card, that is designed to prove the identity of a single user.