Security Technologies for Networked Devices
暂无分享,去创建一个
To protect against “man-in-the-middle” attacks, wherein a hacker eavesdrops on messages between two or more nodes and relays or modifies messages so that the legitimate nodes are deceived into thinking they are talking directly to one another. To protect from such attacks, a successful information assurance strategy must make the mere reception of a signal useless to a would-be hacker.