• A Unauthorized attacks
  • B Virus attacks
  • C Data-driven attacks
  • D Fire attacks