As a security consultant, you are advising a startup that is developing an IoT device for home security. The device communicates with a mobile app, allowing homeowners to monitor their homes in real time. The CEO is concerned about potential Man-in-the-Middle (MitM) attacks that could allow an attacker to intercept and manipulate the device's communication. Which of the following solutions would best protect against such attacks?
Mos3ab
6 months agoprasoonmk
1 year, 1 month agoLordXander
1 year, 4 months agoLordXander
1 year, 4 months agoinsaniunt
1 year, 6 months ago