What type of attack involves the unauthorized transmission of data from a system....