2.1 Identify cyber security vulnerabilities