Various people or functions are prone to cyber attacks; however, distinct groups are more likely to experience different types of assaults more than Many others.[10]Cryptographic techniques can be used to defend data in transit between devices, decreasing the probability the data exchange concerning units might be intercepted or modified.Science: I