Evaluating cybersecurity methods: The system analyzes the li