1. The increased use of data mining can be attributed to the ________.
2. The first rule of computer security is to check ___________.
3. Sources of security threats include all of the following except ________.
4. Most information security incidents will occur because of _________.
5. Most encryption for data stored on a laptop uses ____ cryptography.
6. Botnets function with the use of ________.
7. A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
8. ____ look for specific words and block email messages containing those words.