Illustration of hacker accessing data