Define computer security and explain the difference between passive and active security threat. Provide examples to support your response. Specifically, think of and give a real-life scenario portraying the following concepts:
1. Passive security threat
2. Active security threat.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.