a. Discuss the key principles associated with cybersecurity especially around penetration testing using Shodan. b. Discuss the