Cyber Security Scenarios