Basic Requirements For Cyber Security