Aditya is a digital forensics specialist. He is investigating the computer of an identity theft victim. Which of the following is an attack vector that cannot be investigated on the victim's machine?
1) Malware infection
2) Phishing attack
3) Network intrusion
4) Physical tampering