Understanding a Risk-Based Approach to Cybersecurity