Types of Cyber Vulnerabilities