Man in the middle: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Create page. Source: The Treasurer, December 2018 / January 2019, p31.) |
(Remove surplus text.) |
||
Line 2: | Line 2: | ||
Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client. | Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client. | ||
Line 19: | Line 12: | ||
*[[DDoS]] | *[[DDoS]] | ||
*[[Hotspot sniffing]] | *[[Hotspot sniffing]] | ||
*[[Man-in-the-middle attack]] | |||
*[[National Cyber Security Centre]] | *[[National Cyber Security Centre]] | ||
*[[Sidejacking]] | *[[Sidejacking]] | ||
Line 24: | Line 18: | ||
[[Category:Identify_and_assess_risks]] | [[Category:Identify_and_assess_risks]] | ||
Latest revision as of 13:13, 6 February 2024
Cybersecurity - cyber attacks.
Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.