When it comes to cyber security design, there have been numerous ways of attempting to devise […]