Types Of Cyber Vulnerabilities