What Does The Slam Method Best Stand For Cyber Security