The diagram in Figure 1 illustrates the flow of data via a web-based banking software; the dashed traces stand for the believe in boundaries, wherever knowledge could possibly be probably altered and security steps have to be taken. Spoofing identification: an attacker may possibly attain entry to the process https://ieeexplore.ieee.org/document/9941250