Over the years, the term Cyber Security has gained much importance and become a common part of each one’s life who is associated with a computer or a smartphone device. When people submit their data online, it becomes vulnerable to cyber-attacks or cyber-crimes. Moreover, cyber-attacks can happen over an external facing DNS server or an internal firewall, which in turn effects the data and infrastructure within the enterprise that inherently causes significant damage to the business of the associated organization. Cyber Security offers security, from unauthorized access or exploitation, through online services to the massive data, associated appliances and network that is used for communication. The Cyber Security Life Cycle is classified in to various phases.