Types Of Controls In Cyber Security