The Polar Bear in Your Kitchen: A Cybersecurity Analogy