Part 1: Security Threats Provide an example of at least