Introduction Owing to the advancement in technology, hackers are never idle as they continue to look for new ways that they can use to penetrate and gain unauthorized access to people’s information.