“…For example, social engineering or phishing ( Kushwaha, Buckchash & Raman, 2017 ), zero-day attack ( Jyothsna & Prasad, 2019 ), malware attack ( McIntosh et al, 2019 ), denial of service (DoS) ( Verma & Ranga, 2020 ), unauthorized access of confidential and valuable resources ( Saleh, Talaat & Labib, 2019 ). Additionally, according to the authors of Papastergiou, Mouratidis & Kalogeraki (2020) , a nation’s competitive edge in the global market and national security is currently driven by harnessing these efficient, productive, and highly secure leading-edge technologies with intelligent and dynamic means of timely detection and prevention of cyberattacks. Nevertheless, irrespective of the tireless efforts of security experts in defense mechanisms, hackers have always found ways to get away with targeted resources from valuable and most trusted sources worldwide by launching versatile, sophisticated, and automated cyber-attacks.…”