Torpedo! Top 5 Ways to Sink Your OWN Cyber Security Battleship