Components Of A Cybersecurity Strategy