1.6. System Cyber Security Deployment and Configuration