How To Gather Information In Cyber Security