Experimental Analysis Of Cyber Security