Hacking
Phishing
Malware
Ransomware
Botnet
Key logger
Security software
White hat hacking
Grey hat hacking
Backups
Cipher
Plaintext
Ciphertext
Key
Crack
Brute force
Statistical attack
Caesar cipher
Substitution cipher