✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
When information about transactions is transmitted in transparent way hackers can catch the transmissions to obtain customers sensitive information. This is known as __