network security; fortifying against cyber threats pdf