["What is an example of a cyber threat that exploits human nature?", "What type of malware encrypts a victim's files and demands payment in exchange for the decryption key?", "Which principle ensures that data is accurate, complete, and unaltered during storage or transmission?", "What type of cyber threat sends fraudulent emails that appear to be from a legitimate source in an attempt to trick users into revealing sensitive information?", "Which characteristic of confidentiality ensures that information is accessible only to those authorized to access it?"]