ATTACK VECTOR | TEEN’S DEVICE | HOME NETWORK | WFH DEVICE |
SQL Injection | N/A | N/A | Low |
Cross-Site Scripting | Low | N/A | Low |
Credential Stuffing | High | Low | High |
Brute Force Attack | Low | Low | Low |