Читать книгу Cyber Security and Network Security - Группа авторов - Страница 34
1.4.3 Man-in-the-Middle Prevention
ОглавлениеClient application encrypts each and every data which it sends to the cloud. In addition, in the cloud after verifying, i.e., whether the client is trusted or not it will decrypt the data and perform the rest operations respectively. Since the data is encrypted by double layer encryption no middle man can tamper the data as a result MITM attack cannot be possible, i.e., no one can tamper the data in between the client and cloud.