3.6 Fundamentals of cyber security