Does Cybersecurity Require Programming?