Discuss Insecure External Software Components that may be the target of threat actors. In particular, explore the Application program interface (API), Device drives, and Dynamic link library (DLL). Specific examples must support your discussion responses. 

200 words with references and citations apa 7 style