Dissecting the Anatomy of Cyber Risk: Part 1 of 4