When solving problems, what is the first step?
Develop possible solutions
Recognize and define the problem
Analyze and compare the possible solutions
Select, implement and evaluate a solution
The C.I.A. triad for computer security includes which of these characteristics?
A malware programs that hides its true nature, and reveals its designed behavior only when activated is called a(n) ____________.
An act where people enter real or virtual premises or systems they have not been authorized to enter is called ____________.
What function will an audit log provide when it is configured to track user activity on an information system?