Discuss various cyber security response to mitigate attacks