1.5 How bias can influence cyber security