Introduction: Information technology (IT) systems are the backbone of modern organizations, and changes to these systems are inevitable due to various reasons such as software updates, hardware changes, and so on. However, any changes to IT systems can introduce vulnerabilities, which can be exploited by attackers. Therefore, it is essential […]