Q.
1

 

 

  • Unauthorized attacks

     

  • Virus attacks

     

  • Data-driven attacks

     

  • Fire-attacks