Vulnerabilities To Cyber Attacks