Blocking cyber assaults towards the country's cyber space. Responding to cyber attacks and minimizing harm and recovery time Reducing 'national vulnerability to cyber assaults.Disable unused ports and take away unneeded procedures and circumstances, due to the fact all of these can lead to vulnerabilities.Speedy elasticity. Capabilities is often el