An effective security system utilizes A variety of methods to minimize vulnerabilities and goal lots of varieties of cyberthreats. Detection, avoidance and response to security threats include the usage of security policies, program applications and IT services.An SVI is developed in software and needs a configured IP address plus a subnet mask so