Finally, we will learn how to protect ourselves (and our systems) from the attacks discussed in the preceding sections.