ation and testing process before a system is certified to go ??on line.?? In this way, agencies identify and minimize in advance some of the vulnerabilities posed by malicious code, viruses and worms, and other risks to information or system operations.