169) Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses.
170) ________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.
171) ________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
172) On the whole, ________ controls apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.
173) A(n) ________ examines the firm's overall security environment as well as the controls governing individual information systems.
174) ________ consists of all the policies and procedures a company uses to prevent improper entry to systems by unauthorized insiders and outsiders.
175) ________ refers to the ability to know that a person is who he or she claims to be.
176) Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.
177) When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called ________.
178) Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers ________ the organization's control.