4.2 Implement a basic cyber security control