169) Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses. 170) ________ is a crime in which an imposter obtains key...





169) Malicious software programs referred to as ________ include a variety of threats such as computer viruses, worms, and Trojan horses.



170) ________ is a crime in which an imposter obtains key pieces of personal information to impersonate someone else.



171) ________ is the scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.



172) On the whole, ________ controls apply to all computerized applications and consist of a combination of hardware, software, and manual procedures that create an overall control environment.



173) A(n) ________ examines the firm's overall security environment as well as the controls governing individual information systems.



174) ________ consists of all the policies and procedures a company uses to prevent improper entry to systems by unauthorized insiders and outsiders.



175) ________ refers to the ability to know that a person is who he or she claims to be.



176) Comprehensive security management products, with tools for firewalls, VPNs, intrusion detection systems, and more, are called ________ systems.



177) When errors are discovered in software programs, the sources of the errors are found and eliminated through a process called ________.



178) Domestic or offshore partnering with another company adds to system vulnerability if valuable information resides on networks and computers ________ the organization's control.



May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here