Man in the middle: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Create page. Source: The Treasurer, December 2018 / January 2019, p31.) |
(No difference)
|
Revision as of 21:52, 3 February 2019
Cybersecurity - cyber attacks.
Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.
The man-in-the-middle device intercepts and modifies data exchanged between the two systems.
To the client, the man in the middle appears to be a legitimate server.
To the legitimate server, the man in the middle appears to be a legitimate client.