Answer
See explanation
Work Step by Step
1. Attacks from outside, stopped by the OS's use of admin credentials
2. Attacks from inside, such as by "tricking" the memory manger into letting a process store both upper and lower limits of a process's allotted memory area. The OS 's use of privileged levels can stop this.
3. Attacks from inside using "sniffing software," which can record activities and data (e.g., a keystroke recorder) and send them outside. Privilege levels and admin accounts that maintain security procedures can stop this. Good human security, like identifying phishing attacks, is the most effective way to stop this method.