ICT (Year 7)

Cybersecurity

Which of the following can be a consequence of downloading software from an untrusted source?