Man-in-the-middle attack: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
(Create page - source - ICAEW - https://www.treasurers.org/system/files/ICAEW%20Cyber%20security%20guideline%20V5a%20WEB%20FILE.pdf) |
(Expand definition.) |
||
Line 4: | Line 4: | ||
A man-in-the-middle attack can lead to data theft or data compromise. | A man-in-the-middle attack can lead to data theft or data compromise. | ||
The man-in-the-middle device intercepts and modifies data exchanged between the two systems. | |||
To the client, the man in the middle appears to be a legitimate server. | |||
To the legitimate server, the man in the middle appears to be a legitimate client. | |||
Latest revision as of 13:13, 6 February 2024
Cyber security - cyberthreat.
A man-in-the-middle attack is a cyberthreat in which the attacker intercepts and alters a communication between two parties without their knowledge.
A man-in-the-middle attack can lead to data theft or data compromise.
The man-in-the-middle device intercepts and modifies data exchanged between the two systems.
To the client, the man in the middle appears to be a legitimate server.
To the legitimate server, the man in the middle appears to be a legitimate client.