This report provides a comprehensive analysis of cyber security controls and cyber defense strategies. It begins with an introduction to cyber security, defining its role in protecting data from cybercrimes and attacks. The report then delves into key concepts such as Confidentiality, Integrity, and Availability (CIA) and Authentication, Authorization, and Accounting (AAA). It explores various cyber security attacks, including malware, system failures, and social engineering, and discusses preventive measures like anti-malware software, authentication, data backup, and encryption. The report also covers different types of hackers, malware forms, operating system hardening, virtualization, application security, and network security, including VLANs and cloud security. Furthermore, it addresses server defense, Denial of Service (DoS) attacks, network threats, firewalls, intrusion detection, and unified threat management (UTM). The report also examines authentication models, risk and vulnerability management, cryptography, encryption, and Public Key Infrastructure (PKI). It concludes by identifying issues and concerns in the evolving cyber threat landscape and suggests areas for improvement, such as the integration of Artificial Intelligence and improved patching and testing. The report emphasizes the importance of proactive measures and user awareness for enhanced security and protection.