cybersecurity protocol weaknesses