Computer Science (Year 8)

Cybersecurity

Which of these is a cybersecurity threat?