access
binary
cia
code
competition
computer
crime
criminal
data
destroy
document
encryption
espionage
glove
hacker
hacking
hand
harm
hidden
identify
inquiry
intent
investigation
logo
magnifier
malware application
offender
program
reconnaissance
sabotage
scan
search
security
technology
test
theft
threat
unauthorized
virus
worm