Spheres of Influence in Cyber Security