Which three security vectors must customers monitor to overcome security challenges? (Choose three.)