Artifacts In Cyber Security