There is no strategy or policy that can offer 100% cyber security but it can mitigate allot of the risks and threats. These modifications will assist in stopping attacks before they take place and guard against others when they happen. The hacker has been around since the beginning of the computer and the birth of the internet. They didn’t always have harmful agendas then, as they do now. The threat of being compromised by hackers grows daily with technology evolving so rapidly. There are many different types of “hackers” and their agendas vary, a hacker according to Dunn (2005), “In the computing community, it describes a member of a distinct social group, a particularly brilliant programmer or technical expert who knows a set of programming interfaces well enough to write novel and useful software. In popular usage and in the media, however, it generally describes computer intruders or criminals”. There are a few categories within the “hacker” culture. There are the script kiddies, these are usually where hackers start , they use pre-made code they get from the web. Then there are the hacktivists these are hackers who have social, political, or religious agendas, an example would be the group anonymous they have hacked many businesses and corporations to get there point across. The two biggest