Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies .