Vulnerability Mapping In Cyber Security