With the proliferation of computers and mobile devices, the need for security is rapidly gaining significance where confidential information and critical infrastructure face risks of being hacked. Malware, social engineering, infrastructure destruction, cyberterrorism, system and application exploits are threatening individuals and corporations daily. If these threats are not mitigated, there would be disastrous consequences.