The SudaSys depends on information technology (IT) systems and computer networks for essential operations while risk assessments, however systems can face large and diverse cyber threats that range from unsophisticated hackers to technically competent intruders using state-of-the-art intrusion techniques. Many malicious attacks are designed to steal information and disrupt, deny access to, degrade, or destroy critical information systems.