In this paper, identify some of the common attack types (i.e. ransomware, DDoS, web site defacement, vulnerability exploitation, malware, phishing, social engineering, etc.) used by attackers. Based on your research, identify and analyze some of the technical and procedural security controls that organizations can leverage to either improve detection of or prevent the types of attacks you choose to discuss in your paper. While it is not often thought of as a procedural control, cyber security laws play an important role. You should also include a brief summary indicating whether you feel existing cyber security laws are sufficient and whether new legislation is required.