Mitigation of possible attack vectors

In this chapter, we present solutions for some attack vectors which have been talked of.