1. /
  2. Security Response/
  3. Glossary/
  4. Man-in-the-middle attack

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

Man-in-the-middle attack

An attack in which an attacker is able to read, insert, and modify messages between two users or systems. The attacker must be able to observe and intercept messages between the two victims.