The Human Role In Cybersecurity Vulnerabilities