Intruder gains access to secrets. Hacker hacking into the security system. Data leakage, industrial espionage. Crypto theft, computer viruses. Authentication. Electronic encryption key.