7 | WeLiveSecurity

7

Figure 4: Overlapping activity