Common Weaknesses in Cyber Protection