Contemporary Computing As An Assemblage: An Analysis Of Cyber Security