- Sensitive Information
- The CIA
- Data Leaks
- Data Backups
- Operating Systems (OSes)
- Ransomware
- Information and Communications Technology (ICT)
- Private Data / PII / Information
- Local Area Network (LAN)
- Intrusion Prevention System (IPS)
- Cyber Attackers
- Tor
- Cyber Attacks
- Ransom / Blackmail
- Critical Issue
- Risks