3.2 Explain a basic cyber security framework