how cyber security is done