___ can be described as criminal activity involving information technology infrastructure, including unauthorized asset destruction, file and software deletion, service attacks that result in deterioration, alteration, or suppression of computer data, and unauthorized use of devices.
a. Hacking
b. The dark web
c. Cryptocurrencies
d. Cybercrime