This document outlines steps to mitigate cyber attacks. It defines a cyber attack as any offensive maneuver targeting computer systems for political or security purposes. Cyber attacks target critical infrastructure and aim to steal information, damage infrastructure, or harm reputation for financial or political goals. Attackers include hacktivists, nation states, cyber criminals, and insiders. The document discusses crime-as-a-service on underground forums and lists the Critical Security Controls for effective cyber defense. It also covers detecting attacks through logs and behavior analysis and having an incident response plan to prepare for and respond to attacks.