31.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks. 32.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program. 33.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data. 34.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator. 35.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant control plans. 36.______________________________ are business process objectives that an internal control system is designed to achieve. 37.The control goal called ensure ______________________________ is a measure of success in meting one or more goals for the operations process. 38.The control goal called ensure ______________________________ is a measure of the productivity of resources applied to achieve a set of goals. 39.The control goal that seeks to protect an organization's resources from loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources is called ensure ______________________________. 40.The control goal of ensure ______________________________ strives to prevent fictitious items from entering an information system.
31.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks.
32.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program.
33.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data.
34.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator.
35.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant control plans.
36.______________________________ are business process objectives that an internal
37.The control goal called ensure ______________________________ is a measure of success in meting one or more goals for the operations process.
38.The control goal called ensure ______________________________ is a measure of the productivity of resources applied to achieve a set of goals.
39.The control goal that seeks to protect an organization's resources from loss, destruction, disclosure, copying, sale, or other misuse of an organization's resources is called ensure ______________________________.
40.The control goal of ensure ______________________________ strives to prevent fictitious items from entering an information system.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps