Discuss and explain several defenses that can be used to ward off attackers. Ex. managing patches, examining firewalls, anti-malware software, user account control, data backups, etc. Include your experience and recovery from an attack to your computer, smart phone, or portable device.