Cyber Security Mapping