Vulnerability In Cyber Security Examples