Common Cyber Security Vulnerabilities