Power analysis
Espionage
Cryptography
Attack
Exploit
Hacking
Software testing
Cyberwarfare
Computer network security
Computer security