Foundations Of Cybersecurity 5-6 Data Obfuscation