Also, the "Key Data" sounds bad. Maybe I should use something better to describe the %THING% you need to collect to breach the system?
nvm that, I just got rid of the naming xD