Blocking cyber attacks from the country's cyber House. Responding to cyber attacks and minimizing injury and Restoration time Reducing 'nationwide vulnerability to cyber assaults.With running method–level virtualization in essence making a scalable process of a number of unbiased computing devices, idle computing means may be allotted and utilize