diagram for cyber security - Search