1.3 Compare types of cyber security testing