Types Of Compliance In Cyber Security