Incorrect or improper use of devices, systems, and applications can compromise their security, especially when existing security measures are …