Theses are all the names that help to identify cyber security threats in today’s threat landscape. The is simply too vast and complex to rely on a single, silver bullet solution. Successful information security management requires a broad mix of technology, strategy, processes, people and information security services – all aligned with business objectives to ensure operational success. The Cyber Operations is a wide field that have many areas of interest both technical and non technical areas. Malware – Malware includes any software that harms a system, data, or processes/applications. Trojan – Trojans hide in applications to get into a user’s system or they act as a program themselves. This malware does not replicate. Spyware – This malware gathers a user’s private data (financial info, passwords, usernames, etc.) and sends it to the spyware maker. Adware – Software that displays ads is considered adware. Not all adware is bad. Worms – A computer worm is a replicating program that spreads to other computers. Most rely on networks for transportation. Viruses – Computer viruses are replicating code that spread by hiding inside of infected applications and installers. Zombies – Computer zombies are computers that are controlled by a malicious hacker or computer virus to complete malicious tasks. Riskware – Software with unintended malicious potential. These applications can be used by malware to cause a lot of damage. DDoS Cyber Attack Protection – Prevent attackers from using un-wanted request to drain resources on server or website .