Graphs for Cybersecurity