which malicious code was contained inside apparently harmless data in such a way that it got control and did damage. What is this type of program called?
If a systems development life cycle methodology is inadequate, the most serious risk is likely to be that the project: