identify common network attacks describe social engineering indentify malware vectors of data loss vectors of dataexfiltration