For information which is electronically stored, e.g. in RAM, the problem posed to those attempting to protect the information is rendered difficult by the inability to predict by what means an attacker would use to attempt to gain access to the information.