Which of the following exploit vulnerabilities to cause loss or damage to the organization and its assets?