This assists guard versus unauthorized use that may be unnoticed by These responsible for shielding the integrity on the server.The request is hopped over multiple routers right before it reaches Alice and vice versa for Bob. Any data provided in plain text, is prone to cyber secruity attacks like phishing, guy in the middle assault and replay assa