Due to the static nature of modern day computing systems, they are quite defenseless against the hackers. Hackers make use of the time to tap into the vulnerabilities or gaps in the system and initiate an attack. This is unacceptable as it provides a skewed advantage to the ha...