Virtually all of us are dependent on the use of the Internet and Internet-connected devices. People are plugged in, online, and in constant communication through wired and wireless telecommunication networks coupled to the Internet.By virtue of this dependency, we entrust Internet-enabled applications, programs, and connected devices with our most private communications and personal and financial details. Yet we read, almost on a daily basis, of hacks and compromises on a gargantuan scale, of the very systems we entrust with our private business and personal data.