Securing risks facing cyber security, such as spreading data, opening insecure ports, or hacking.