3_6_2 Methods to detect and prevent cyber security threats