Watch this video on YouTube
Which combination results in a successful cyber attack, according to foundational security principles?