Statements (48)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Cyberattack
|
| gptkbp:affects |
gptkb:Computer_Networks
Communication Protocols |
| gptkbp:alsoKnownAs |
gptkb:MITM_Attacks
|
| gptkbp:commonIn |
Public Wi-Fi Networks
|
| gptkbp:detects |
gptkb:Network_Monitoring
gptkb:Certificate_Pinning Anomaly Detection |
| gptkbp:example |
Active Attack
Network Attack |
| gptkbp:exploits |
Unencrypted Connections
Weak Security Protocols |
| gptkbp:firstDescribed |
1970s
|
| gptkbp:involves |
Eavesdropping
Message Alteration |
| gptkbp:mitigatedBy |
gptkb:VPNs
Intrusion Detection Systems Multi-Factor Authentication End-to-End Encryption Network Segmentation User Education Regular Software Updates Firewall Configuration Disabling Open Wi-Fi Disabling Unused Services Secure Protocols Strong Password Policies |
| gptkbp:prevention |
gptkb:public_key_infrastructure
Encryption Authentication Digital Certificates |
| gptkbp:relatedTo |
ARP Spoofing
Replay Attacks DNS Spoofing Evil Twin Attack SSL Stripping |
| gptkbp:target |
Data Transmission
DNS Requests Email Communications HTTPS Connections TLS/SSL Protocols VoIP Calls |
| gptkbp:usedFor |
Data Manipulation
Credential Theft Session Hijacking |
| gptkbp:bfsParent |
gptkb:DHCP_Snooping
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Man-in-the-Middle Attacks
|