cyber constructs