Introduction Walking through the continuously expanding hall of cyber threats, one has to admit that threats now are directed towards unique data, money and even the critical infrastructure of some nations. Knowledge of these threats goes hand in hand with the need of devising relevant countermeasures to protect digital resources and maintain confidentiality. […]