How Can We Prevent, Detect, and Recover from Cyberattacks? - Part I