Man-in-the-middle attack: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
(Create page - source - ICAEW - https://www.treasurers.org/system/files/ICAEW%20Cyber%20security%20guideline%20V5a%20WEB%20FILE.pdf)
 
(Expand definition.)
 
Line 4: Line 4:


A man-in-the-middle attack can lead to data theft or data compromise.
A man-in-the-middle attack can lead to data theft or data compromise.
The man-in-the-middle device intercepts and modifies data exchanged between the two systems.
To the client, the man in the middle appears to be a legitimate server.
To the legitimate server, the man in the middle appears to be a legitimate client.





Latest revision as of 13:13, 6 February 2024

Cyber security - cyberthreat.

A man-in-the-middle attack is a cyberthreat in which the attacker intercepts and alters a communication between two parties without their knowledge.

A man-in-the-middle attack can lead to data theft or data compromise.


The man-in-the-middle device intercepts and modifies data exchanged between the two systems.

To the client, the man in the middle appears to be a legitimate server.

To the legitimate server, the man in the middle appears to be a legitimate client.


See also