Which of the following is considered a fundamental problem with making IT security a staff department outside IT?
________ has set the standards for companies that accept credit cards as a form of payment.
One of the first data breach notification laws in the U.S. was created in ________.
________ are spread through e-mail with infected attachments.
What happens in substitution ciphers?
Comprehensive security pertains to ________.
________ are programs that attach themselves to legitimate programs.
________ is a generic term for "evil software."
Which of the following is an EU privacy law?