MCT and Man in the middle: Difference between pages
From ACT Wiki
(Difference between pages)
imported>Administrator (CSV import) |
imported>Doug Williamson (Create page. Source: The Treasurer, December 2018 / January 2019, p31.) |
||
Line 1: | Line 1: | ||
''Cybersecurity - cyber attacks.'' | |||
Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client. | |||
The man-in-the-middle device intercepts and modifies data exchanged between the two systems. | |||
To the client, the man in the middle appears to be a legitimate server. | |||
To the legitimate server, the man in the middle appears to be a legitimate client. | |||
==See also== | |||
*[[CEO fraud]] | |||
*[[Cyber attack]] | |||
*[[Cybercrime – A Threat And An Opportunity]] | |||
*[[Cyber security: protecting your business and your clients]] | |||
*[[Cybersecurity]] | |||
*[[DDoS]] | |||
*[[Hotspot sniffing]] | |||
*[[National Cyber Security Centre]] | |||
*[[Sidejacking]] | |||
*[[Social engineering]] | |||
[[Category:Identify_and_assess_risks]] | |||
[[Category:Technology]] |
Revision as of 21:52, 3 February 2019
Cybersecurity - cyber attacks.
Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.
The man-in-the-middle device intercepts and modifies data exchanged between the two systems.
To the client, the man in the middle appears to be a legitimate server.
To the legitimate server, the man in the middle appears to be a legitimate client.