Introduction
Imagine sending a private letter to a friend, but someone secretly reads and changes it before it reaches them. This problem happens in computer networks when attackers secretly intercept and alter communication between two parties without their knowledge.