Risk Control Strategies In Cyber Security