The Role of Graphs in Cybersecurity