There are various practices and resources available for individuals seeking to protect their digital accounts. As a result of the increased value and applications of digital systems and improvements, practices have been developed to protect structures from digital attacks and vulnerabilities. Arguably, one of the most effective techniques for this