cyber vulnerabilities (2)