man in the middle attack

man in the middle attack
n.
A computer security breach in which a malicious user intercepts — and possibly alters — data traveling along a network. (Also: man-in-the-middle attack.)
Example Citation:
If it delivers what's promised, Funk's Odyssey software will let enterprises use familiar password-based authentication for wireless LANs and existing authentication databases, but protect these interactions from the special weaknesses of wireless links, such as eavesdropping or so-called "man in the middle" attacks.
— John Cox, "Funk releases 802.1x software for WLAN security," InfoWorld Daily News, February 5, 2002
Earliest Citation:
Computers operating at speeds far in excess of current ones are technically feasible. Building them is only a matter of money. The cost of $4, $10 or $50 million might be high for a university or major corporation, it's peanuts for NSA. Informed sources indicate that such a computer would be capable of cracking a Clipper cipher in a matter of minutes. Clipper also lends itself, under proper conditions, to a 'man in the middle' attack.
— "How string is Clipper?," Computer Fraud & Security Bulletin, May, 1994
Notes:
This exploit also goes by the name TCP hijacking (where TCP is a method by which data is transmitted across a network).
Related Words: Categories:

New words. 2013.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent …   Wikipedia

  • Meet-in-the-middle attack — Not to be confused with man in the middle attack. The meet in the middle attack is a cryptographic attack which, like the birthday attack, makes use of a space time tradeoff. While the birthday attack attempts to find two values in the domain of… …   Wikipedia

  • Middle man — or middleman may refer to: wholesaler or reseller Middle Man (album), a 1980 album by Boz Scaggs Middleman (band), a 4 piece alternative band based in Leeds in West Yorkshire, England The Middleman (TV series), an ABC Family TV series based on… …   Wikipedia

  • List of Malcolm in the Middle episodes — Malcolm in the Middle ran for seven seasons from 2000 to 2006 with 151 episodes produced. Contents 1 Series overview 2 Season 1: 2000 3 Season 2: 2000–2001 4 …   Wikipedia

  • Pederasty in the Middle East and Central Asia — For a generalized discussion of relations between men and boys see main article: Pederasty The practice of pederasty in the Middle East seems to have begun, according to surviving records, sometime during the 800s and ended, at least as an open… …   Wikipedia

  • Allegory in the Middle Ages — Noah and the baptismal flood of the Old Testament (top panel) is typologically linked (prefigured) by the baptism of Jesus in the New Testament (bottom panel). Allegory in the Middle Ages was a vital element in the synthesis of Biblical and… …   Wikipedia

  • Romania in the Middle Ages — Context The Dark Ages in what is now Romania ended around the 11th century, following the period in which the Romanian lands had been part of the First Bulgarian Empire (802 1018). During that period, the Magyar tribes, led by Árpád, migrated… …   Wikipedia

  • The Age of Reason — The Age of Reason: Being an Investigation of True and Fabulous Theology , a deistic treatise written by eighteenth century British radical and American revolutionary Thomas Paine, critiques institutionalized religion and challenges the inerrancy… …   Wikipedia

  • The Kingdom (film) — The Kingdom Promotional poster Directed by Peter Berg Produced by …   Wikipedia

  • Middle Eastern Empires — The Middle East has been the political center of several empires through history. Many of the earliest known empires originated in the middle east. Middle eastern empires have been instrumental in the spreading of ideas, technology and religions… …   Wikipedia

  • Spoofing attack — In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. Man in the middle attack and internet… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”