Man in the middle: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson
(Create page. Source: The Treasurer, December 2018 / January 2019, p31.)
(No difference)

Revision as of 21:52, 3 February 2019

Cybersecurity - cyber attacks.

Man in the middle attacks are a form of cyber attack that use devices that lie in between a legitimate server and a legitimate client.


The man-in-the-middle device intercepts and modifies data exchanged between the two systems.

To the client, the man in the middle appears to be a legitimate server.

To the legitimate server, the man in the middle appears to be a legitimate client.


See also