0

Who is a “Party to the Communication” in a Network Intrusion?