Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?