Respuesta :

cyn01
1. Hardware theft
2. Security theft
3. Unauthorized access and use
4. Internet and network attack
5. information theft
6. system failure