Phases of Security: Essential Cyber-Security Phrases