UNINTENTIONALDECISIONS
VULNERABILITIES
SOFTWAREVIRUSES
CYBERSECURITY
PHISHINGSCAMS
UNDERTHEHOOD
COMPROMISED
CYBERARMY
PROBLEMS
HIJACKED
PROFILE
ATTACKS
STOLEN
HACKED
CRIME
I
S
O
F
T
W
A
R
E
V
I
R
U
S
E
S
V
U
Z
I
E
N
N
N
K
A
Y
P
P
U
I
O
U
N
D
E
R
T
H
E
H
O
O
D
E
I
Z
U
R
R
O
N
E
G
S
O
G
E
U
O
I
S
Y
A
E
Q
K
D
W
Z
N
R
E
Q
H
W
V
N
N
M
R
E
T
K
D
H
T
V
Z
J
B
E
F
J
E
O
H
M
K
P
G
O
O
C
U
E
U
O
L
U
I
K
P
Z
U
S
G
I
L
N
U
U
U
U
A
D
I
T
C
E
L
J
U
Q
R
O
R
P
K
I
E
O
O
U
A
R
B
V
O
E
S
D
K
U
U
I
N
X
U
S
I
R
O
M
X
R
T
I
G
U
L
K
I
K
I
N
U
E
C
N
I
O
C
H
S
O
A
O
F
X
S
R
O
P
Z
N
Q
C
C
J
P
V
R
B
K
K
E
K
O
F
C
R
I
M
E
U
I
N
V
X
H
A
E
B
H
U
C
L
I
R
S
G
O
I
E
P
I
A
U
R
D
Y
N
A
I
J
D
U
I
L
O
Y
T
R
R
O
G
L
E
M
J
O
E
V
E
H
A
G
N
I
L
H
S
N
U
G
N
Y
E
R
H
E
T
O
L
K
T
O
F
M
E
U
H
H
A
H
H
E
F
O
A
G
B
Q
U
X
Y
C
M
P
O
A
P
A
O
O
N
U
N
A
I
R
U
H
H
I
Y
U
V
Y
Q
C
U
N
H
J
H
J
I
S
I
O
O
C
N
A
H
Q
I
I
C
X
U
J
C
Y
F
G
X
A
X
U
N
Y
W
O
I
K
G
B
U
L
L
A
T
O
J
O
Z
B
L
R
I
X
A
N
E
A
W
O
T
E
S
I
A
A
Q
W
C
D
V
F
I
E
Z
R
G
B
S
K
J
K
T
V
N
D
C
L
I
P
K
I
O
S
D
X
U
R
U
M
I
C
I
E
X
W
D
I
E
C
A
I
I
A
Z
S
E
C
O
A
H
A
E
O
O
A
I
V
U
W
T
J
T
C
M
T
P
R
O
B
L
E
M
S
M
R
T
B
D
O
L
J
E
H
T
N
N
L
S
I
C
P
R
L
A
X
P
N
J
M
P
Z
E
H
O
Q
Y
Q
E
O
I
R
U
E
K
J
U
O
T
E
W
N
N
Y
B
V
K
U
K
E
O
Y
T
D
N
Z
C
S
I
A
O
Q
S
A
Y
Z
P
V
G
U
E
P
P
M
Z
M
S
B
U
W
T
V
I
J
U
U
D
V
P
A
T
T
A
C
K
S