Man in the middle and Net settlement: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Create page. Source: The Treasurer, December 2018 / January 2019, p31.)
 
imported>Doug Williamson
(Linked to The Treasurers Handbook - Payments and payment systems)
 
Line 1: Line 1:
''Cybersecurity - cyber attacks.''
''Funds transfer''


Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.
The settlement of a number of obligations or transfers between or among counterparties on a net basis.




The man-in-the-middle device intercepts and modifies data exchanged between the two systems.
== See also ==
 
* [[Designated-time net settlement system]]
To the client, the man in the middle appears to be a legitimate server.
* [[Gross settlement system]]
 
* [[Payments and payment systems]]
To the legitimate server, the man in the middle appears to be a legitimate client.
 
 
==See also==
*[[CEO fraud]]
*[[Cyber attack]]
*[[Cybercrime – A Threat And An Opportunity]]
*[[Cyber security: protecting your business and your clients]]
*[[Cybersecurity]]
*[[DDoS]]
*[[Hotspot sniffing]]
*[[National Cyber Security Centre]]
*[[Sidejacking]]
*[[Social engineering]]
 
[[Category:Identify_and_assess_risks]]
[[Category:Technology]]

Revision as of 16:31, 29 November 2014

Funds transfer.

The settlement of a number of obligations or transfers between or among counterparties on a net basis.


See also