Cyberattacks on BCIs can be categorized into three main types: controlling, stealing, and disrupting. Unauthorized access, a primary security concern, involves attackers gaining control of a user's BCI device (Denning, Matsuoka, and Kohno 2009). Unauthorized access can occur through various methods, including physical tampering, exploiting software or hardware vulnerabilities, and intercepting wireless communication channels. Unauthorized access can lead to severe consequences, such as manipulating user inputs, disclosing private information, and potentially harming the user's health (Ajrawi, Rao, and Sarkar 2021).