Statements (24)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cyber attack
|
gptkbp:allows |
man-in-the-middle attacks
|
gptkbp:associated_with |
encryption vulnerabilities
|
gptkbp:can_be |
weaknesses in cryptographic protocols
|
gptkbp:controls |
enforcing strong cipher suites
using strong parameters |
gptkbp:documentedIn |
security advisories
|
https://www.w3.org/2000/01/rdf-schema#label |
Logjam attack
|
gptkbp:impact |
HTTPS traffic
TLS_connections |
gptkbp:is_a |
downgrade attack
|
gptkbp:is_available_in |
2015
|
gptkbp:is_evaluated_by |
legacy systems
|
gptkbp:is_supported_by |
updating server configurations
|
gptkbp:issues |
secure communications
|
gptkbp:isVulnerableTo |
secure communications protocols.
|
gptkbp:leads |
data interception
|
gptkbp:related_to |
FREAK attack
|
gptkbp:relatedTo |
POODLE attack
|
gptkbp:reportsTo |
researchers_at_the_University_of_Michigan
|
gptkbp:requires |
active network attacker
|
gptkbp:skills |
Diffie-Hellman key exchange
|
gptkbp:targets |
weak Diffie-Hellman parameters
|
gptkbp:threats |
privacy and security
|