Models Used In Cyber Security