Читать книгу Cyber Security and Network Security - Группа авторов - Страница 34

1.4.3 Man-in-the-Middle Prevention

Оглавление

Client application encrypts each and every data which it sends to the cloud. In addition, in the cloud after verifying, i.e., whether the client is trusted or not it will decrypt the data and perform the rest operations respectively. Since the data is encrypted by double layer encryption no middle man can tamper the data as a result MITM attack cannot be possible, i.e., no one can tamper the data in between the client and cloud.

Cyber Security and Network Security

Подняться наверх