6.9 Identifying A Cybersecurity Threat | Computer 12 Notes | Notely