Countermeasures
Deploy Assets to Address Threat Profile
- Education: written security policy, 'social engineering' defences,
documentation, user training
- Engineering: human, network and system configurations to reduce 
exposure of high value assets -- build security into the design
- Testing: usability testing, penetration test, IV&V 
- Maintenance: bugfixes, new releases, new attacks, network upgrades, 
integrity checks, usability enhancements,evolution of the Internet
Goals and Tools
-  Avoidance: concealment, evasion, misdirection
-  Detection and Defence: Network monitoring, traffic analysis/control,
logging, hardened software, encryption and authentication, human 
eyeballs,offline communication, backdoors, trapdoors and sandboxes
-  Backup: reliable onsite and offsite backup, verification issues,
alternate communication channels
-  Contingency Planning: Can you restart from scratch ?
So what do you do if tragedy strikes?