Assignment problem: As hacker chooses any cyber attack that thinks it's the best and create Plan of mitigation with the below points should be consider:-
1. How does infection works?
2. How will gain entry point or accomplish the attack?
3. What kind of information you will get from the company during the attack phase?
4. How to bypass the protection that companies using to protect themselves?
5. As defender how businesses can protects themselves from this attack and apply best practice policy?