Abbreviated as MITMA, a man-in-the-middle attack is where someone gets between the sender and receiver of information, sniffing any information sent. In some cases, users may be sending unencrypted data, which means the MITM (man-in-the-middle) can obtain any unencrypted information. In other cases, a user may obtain information from the attack, but needs to decrypt the information before it can be read. The picture below is an example of how a man-in-the-middle attack works. The attacker intercepts some or all traffic coming from the computer, collects the data, and then forwards it to the original destination.
Computer acronyms, Encrypt, Phishing, Security terms, Side jacking, Threat
Related information
- How to protect yourself while on the Internet.
- Computer security help and support.