179) Smartphones share the same ________ weaknesses as other Internet devices and are vulnerable to malicious software and penetration from outsiders.
180) Popular IM applications for consumers do not use a ________ for text messages, so they can be intercepted and read by outsiders during transmission over the public Internet.
181) Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to obtain an address to access the resources of a network without ________.
182) The ________ worm uses flaws in Windows software to take over machines and link them into a virtual computer that can be commanded remotely.
183) The ________ worm affected millions of computers worldwide, disrupting British Airways flight check-ins, operations of British Coast Guard stations, Hong Kong hospitals, Taiwan post office branches, and Australia's Westpac Bank.
184) The ________ worm Word macro script mailed an infected Word file to the first 50 entries in a user's Microsoft Outlook address book. Infected 15 to 29 percent of all business PCs, causing $300 million to $600 million in damage.
185) The ________ worm was first identified in January 2007. It spreads via e-mail spam with a fake attachment. Infected up to 10 million computers, causing them to join its zombie network of computers engaged in criminal activity.
186) ________ attacks are the largest malware threat, their attacks take advantage of vulnerabilities in poorly coded Web application software to introduce malicious program code into a company's systems and networks.
187) Businesses must protect not only their own information assets but also those of ________, employees, and business partners.