| Similarity | Rank | |
|---|---|---|
| security_breach | 0.848 | 70052 |
| identity_theft | 0.717 | 36030 |
| cyber_attack | 0.713 | 58720 |
| cyber_crime | 0.668 | 97451 |
| cybercrime | 0.659 | 58930 |
| data_security | 0.654 | 71029 |
| datum_security | 0.630 | 83145 |
| information_security | 0.628 | 25742 |
| phishing | 0.615 | 76508 |
| cybersecurity | 0.612 | 29050 |
| sensitive_datum | 0.611 | 69103 |
| cyber_security | 0.587 | 29800 |
| customer_datum | 0.584 | 66537 |
| network_security | 0.574 | 45208 |
| malware | 0.570 | 12397 |
| data_protection | 0.568 | 42270 |
| sensitive_information | 0.559 | 53186 |
| privacy_issue | 0.558 | 62834 |
| Cybersecurity | 0.558 | 62294 |
| cloud_computing | 0.547 | 12561 |
| datum_protection | 0.545 | 53904 |
| botnet | 0.544 | 78332 |
| cloud_provider | 0.542 | 88794 |
| computer_security | 0.541 | 68036 |
| breach | 0.541 | 5906 |