Downgrade Attack And Its Prevention Explained