• A Phishing
  • B Firewall
  • C Encryption
  • D Authentication