3 Cybersecurity Vectors