UNINTENTIONALDECISIONS
VULNERABILITIES
SOFTWAREVIRUSES
CYBERSECURITY
PHISHINGSCAMS
UNDERTHEHOOD
COMPROMISED
CYBERARMY
PROBLEMS
HIJACKED
PROFILE
ATTACKS
STOLEN
HACKED
CRIME
S
S
O
F
T
W
A
R
E
V
I
R
U
S
E
S
Q
T
M
K
Q
M
D
I
S
U
A
U
N
E
M
O
U
N
D
E
R
T
H
E
H
O
O
D
L
A
T
A
Z
H
D
B
M
A
S
E
X
J
U
A
F
V
Y
I
L
A
W
D
L
U
N
E
I
N
I
W
M
X
N
U
G
C
B
A
K
U
T
S
P
F
A
E
U
I
E
T
A
M
I
P
N
O
O
A
V
X
P
V
U
E
I
A
A
Y
V
S
U
I
L
A
P
T
Z
O
I
D
I
V
B
N
B
I
H
K
R
Z
E
P
U
I
E
L
O
U
G
I
E
B
H
E
S
L
C
M
A
I
U
T
U
F
I
R
U
M
W
N
T
U
I
A
I
G
L
K
I
Y
R
J
U
I
O
O
C
Q
E
O
Q
O
M
J
S
A
N
Z
C
O
Q
C
C
U
P
V
O
E
T
I
E
B
U
F
C
R
I
M
E
J
O
Q
K
L
Z
A
E
E
H
U
I
K
H
L
S
O
L
I
A
P
U
C
W
U
E
I
G
W
M
J
D
O
I
L
U
I
L
E
R
B
L
L
E
M
L
G
V
M
I
O
C
O
B
I
L
A
S
N
F
N
E
V
E
D
U
E
K
O
A
E
G
J
G
O
G
N
O
H
A
H
H
E
O
D
U
H
B
O
A
A
W
C
P
W
Z
M
Z
Q
P
X
B
Z
N
A
I
R
E
K
R
E
Y
S
C
Y
R
C
O
N
O
O
U
R
E
U
D
A
O
C
N
A
D
O
H
V
C
N
Y
E
O
Y
J
E
G
Z
F
I
V
A
E
U
I
K
G
B
I
A
H
D
J
P
M
H
O
B
U
F
Z
I
V
A
K
H
E
U
T
E
S
I
W
N
Q
A
N
O
K
A
O
E
E
M
S
H
T
U
R
E
I
E
N
D
C
L
P
U
P
R
A
A
O
H
D
R
Q
E
X
R
U
D
G
O
E
I
E
M
A
I
B
X
K
A
N
A
I
A
F
A
A
M
U
V
P
E
U
J
Y
B
T
U
M
T
P
R
O
B
L
E
M
S
S
R
G
I
P
M
O
N
I
U
U
C
N
O
S
I
B
O
R
A
Q
Y
E
W
X
M
U
G
M
T
O
T
F
T
D
G
I
I
K
E
U
F
R
A
T
U
N
E
F
Y
R
A
L
X
E
Z
S
O
L
Q
N
Y
A
S
F
O
I
E
E
Q
A
O
R
K
J
L
F
U
E
A
I
V
O
O
U
R
O
R
M
D
E
I
E
A
U
A
T
T
A
C
K
S