• Active vs Passive Security Threats Explained