Survival of the Fittest: Defending IBM i Against a Cyber Attack