Investigate privacy Security Targets cybersecurity data integrity encryption exposure forensics integrity investigation password phishing supply chain threat