A. Denial of Service (DoS) attacks
B. Man-in-the-Middle (MitM) attacks
C. Physical tampering
D. Lack of encryption