| Similarity | Rank | |
|---|---|---|
| data_breach | 0.848 | 98035 |
| cyber_attack | 0.744 | 58720 |
| identity_theft | 0.658 | 36030 |
| security_risk | 0.633 | 53682 |
| cyber_crime | 0.628 | 97451 |
| data_security | 0.621 | 71029 |
| malware | 0.621 | 12397 |
| security_threat | 0.620 | 47415 |
| phishing | 0.619 | 76508 |
| sensitive_datum | 0.616 | 69103 |
| cybercrime | 0.611 | 58930 |
| security_measure | 0.603 | 29180 |
| break-in | 0.603 | 80621 |
| information_security | 0.602 | 25742 |
| datum_security | 0.592 | 83145 |
| sensitive_information | 0.591 | 53186 |
| such_attack | 0.591 | 65147 |
| hacking | 0.590 | 22694 |
| theft | 0.584 | 8618 |
| security_problem | 0.584 | 62807 |
| network_security | 0.578 | 45208 |
| such_incident | 0.574 | 69292 |
| hacker | 0.569 | 8452 |
| cybersecurity | 0.569 | 29050 |
| cyber_security | 0.567 | 29800 |