Mitigation Strategies For Cyber Attacks