2.1 Define core terminology used in cyber security