Command and Control Cyberattack: How to Identify and Prevent them?