Attack Mitigation Strategies