Cyber Security Tools Explained