cybersecurity figure 1