I. Introduction
In the last decade, the focus of IT businesses has shifted towards cybersecurity - thereby making it one of the foundations for computational service delivery and providing security. Despite having a good cybersecurity infrastructure and personnel training; cyberattacks and threat vectors have evolved at an unprecedented rate [1]. In 2019, 21 million passwords and 770 million email addresses were exposed from the MEGA cloud service which was later named “Collectionl” as nearly 1 TB of critical data was leaked. Half a billion Facebook user records, 100 million user records of JustDial in India, personal medical data of 1 million users in New Zealand, 3 million customer details from a banking firm UniCredit in Italy were exposed by various online cyberattacks [2].