Describe possible threats to a laptop, tablet, computer, and/or network and methods for avoiding attacks related to programming.