Hardening Process In Cyber Security