Man-in-the-Middle Attacks

GPTKB entity

Statements (49)
Predicate Object
gptkbp:instanceOf Cyberattack
gptkbp:affects gptkb:Computer_Networks
Communication Protocols
gptkbp:alsoKnownAs gptkb:MITM_Attacks
gptkbp:commonIn Public Wi-Fi Networks
gptkbp:detects gptkb:Network_Monitoring
gptkb:Certificate_Pinning
Anomaly Detection
gptkbp:example Active Attack
Network Attack
gptkbp:exploits Unencrypted Connections
Weak Security Protocols
gptkbp:firstDescribed 1970s
https://www.w3.org/2000/01/rdf-schema#label Man-in-the-Middle Attacks
gptkbp:involves Eavesdropping
Message Alteration
gptkbp:mitigatedBy gptkb:VPNs
Intrusion Detection Systems
Multi-Factor Authentication
End-to-End Encryption
Network Segmentation
User Education
Regular Software Updates
Firewall Configuration
Disabling Open Wi-Fi
Disabling Unused Services
Secure Protocols
Strong Password Policies
gptkbp:prevention public key infrastructure
Encryption
Authentication
Digital Certificates
gptkbp:relatedTo ARP Spoofing
Replay Attacks
DNS Spoofing
Evil Twin Attack
SSL Stripping
gptkbp:target Data Transmission
DNS Requests
Email Communications
HTTPS Connections
TLS/SSL Protocols
VoIP Calls
gptkbp:usedFor Data Manipulation
Credential Theft
Session Hijacking
gptkbp:bfsParent gptkb:DHCP_Snooping
gptkb:Certificate_Pinning
gptkbp:bfsLayer 7