What are the vulnerabilities in cyber security?