Cyber Defense Planning In Tabletop Exercises And Consideration Of A Fractured Flaw Theory For Security Applications