Prevailing Strategies to Protect Cybersecurity