Which of the following type of potential security threats does this scenario describe?