Cyber Security Theory