d. If you then actually transferred money from their account into yours. Explain, from the bank’s perspective, which Pillar of Cyber Security would be attacked? e. If you then were able to delete any record of the money transfer. Explain, from the bank’s and account holder’s perspective, which Pillar of Cyber Security would be attacked. 5. Regarding operating system services, in what ways can a user interface with the operating system? Show transcribed image text d. If
OR
OR