Data Flow Chart For Cyber Security