"They detail the types of data that any firm might use to create value that are also of interest to attackers." . . . .