Cybersecurity - vulnerabilities - port scanning - mail configuration