The main methods of implementing threats to information security include:
Translated with www.DeepL.com/Translator (free version)