Vulnerabilities In Cyber Security