Cyber Security in Cyber Influence Operations