II. Areas of cybersecurity