The process involves the protection of data from loss of integrity, hacking, etc. Along with the fact that hardware, applications, databases, and websites are exposed to threats