Mitigation Techniques In Cyber Security