This visual execution shows common types of cyber threats. The flow starts with a threat appearing, identifying its type such as malware or phishing, then acting on the system causing damage like data loss or service downtime. The execution table lists each threat type, its action, and result step-by-step. The variable tracker shows system state before and after each threat acts. Key moments clarify common confusions like how ransomware encrypts files or how phishing steals credentials. The quiz tests understanding by asking about specific steps and effects. This helps learners see how different cyber threats work and affect systems.