mobile applications and IoT devices. These applications and devices have a database at the
back‐end which can contain sensitive information. The information might contain personal
details as well as information which are not meant to be altered illicitly. Hackers are always
looking to penetrate into the databases to gather information which can later be used for
illegal purposes. Such breaches can cause harm to the individual as well as the …