Which of the following options can be considered as Data and Application security risks in IT infrastructure?