Need realistic answer without plagiarism

  • attachment

    cyber_attack.PNG