Man in the middle: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Create page. Source: The Treasurer, December 2018 / January 2019, p31.)
 
(Remove surplus text.)
 
Line 2: Line 2:


Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.
Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.
The man-in-the-middle device intercepts and modifies data exchanged between the two systems.
To the client, the man in the middle appears to be a legitimate server.
To the legitimate server, the man in the middle appears to be a legitimate client.




Line 19: Line 12:
*[[DDoS]]
*[[DDoS]]
*[[Hotspot sniffing]]
*[[Hotspot sniffing]]
*[[Man-in-the-middle attack]]
*[[National Cyber Security Centre]]
*[[National Cyber Security Centre]]
*[[Sidejacking]]
*[[Sidejacking]]
Line 24: Line 18:


[[Category:Identify_and_assess_risks]]
[[Category:Identify_and_assess_risks]]
[[Category:Technology]]

Latest revision as of 13:13, 6 February 2024

Cybersecurity - cyber attacks.

Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.


See also