Mitigation Capabilities In Cyberattack