Asymmetrical Security Challenges: From Terrorism to Cyber attack