Practices to Detect and Eliminate Cyber Attacks Threats