In the context of intentional computer and network threats, a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public and private networks. a. blended threat b. mirror disk c. backdoor threat d. firewall