ABSTRACT

After so many years, there is probably no need to still be so pessimistic about this security distress. I am sure there are, by now, all types of security controls that can protect our information assets, computers, and networks from all hackers’ transgressions. However, we continue to have problems while improvements for our operating systems are continuously delivered through new versions, new patches, new best practices, and in many other different secure ways.