RANSOMWARE ATTACK VECTORS EXPLAINED: HOW X-PHY DEFENDS AGAINST DIGITAL INTRUSIONS