This report provides a comprehensive overview of cyber security strategies and policies essential for organizational protection. It begins by highlighting the importance of security awareness and training programs to reduce cyber security risks through employee education. The report details the creation and enforcement of cyber security policies, including access control and data encryption, to mitigate internal and external threats. It further discusses intrusion detection and prevention tools and techniques, emphasizing the use of systems like Snort to identify and block malicious activity. Vulnerability assessment and penetration testing procedures are explored as methods to proactively identify and address system weaknesses. The report also outlines the critical components of a disaster recovery program, focusing on data backup and the implementation of firewalls and strict access controls. Finally, it explains the Defence in Depth principle, which integrates physical, technical, and administrative controls to ensure robust security across the entire system.