UC11_TC_26

*Precondition: HSM and Secure Gateway have been run in Otokar's system and verification has been completed. * Input conditions / steps: Communication is listened from the ends of the network and data blocks are collected. Tampering is applied to HSM. MitM attack is organised. Unauthorised access is realised. * Expected outcome: It is verified that the data is integrated and encrypted from the end to the end in the network. Malicious people cannot access either the data transferred in the communication or the authentication keys
UC11_TC_26
TBA
VALU3S Framework
Contents

There are currently no items in this folder.