Identify Cyber Security Vulnerabilities