This objective may include but is not limited to: encryption, digital signature, hashing, salting, least privilege ...