Answer:
Methods employed in each case
Step-by-step explanation:
The elements of cyber crime are nearly identical to the activities of cyber terrorism, state-sponsored information warfare, and espionage. The distinction between these activities is most often defined from the perspective of the METHODS EMPLOYED IN EACH CASE.