This report provides a comprehensive overview of computer security and cyber security measures to protect systems and information from unauthorized access and harm. It discusses the importance of developing relevant strategies, procedures, and policies for securing devices and conducting operations in an efficacious manner. The report also includes a technical document on Security Operations Center (SOC) and its role in continuously monitoring and addressing security measures. It covers topics such as information assurance methodologies, incident management, audit assurance and review, business continuity planning and management, and disaster recovery planning. The report concludes with a discussion on incident response and the steps to be taken for prevention, identification, containment, elimination, recovery, and learning from security breaches.