Graph-Based Cybersecurity