Scenario 2 – A man-in-the-middle attack–integrity attacks