Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cyberattack
|
gptkbp:affects |
gptkb:Computer_Networks
Communication Protocols |
gptkbp:alsoKnownAs |
gptkb:MITM_Attacks
|
gptkbp:commonIn |
Public Wi-Fi Networks
|
gptkbp:detects |
gptkb:Network_Monitoring
gptkb:Certificate_Pinning Anomaly Detection |
gptkbp:example |
Active Attack
Network Attack |
gptkbp:exploits |
Unencrypted Connections
Weak Security Protocols |
gptkbp:firstDescribed |
1970s
|
https://www.w3.org/2000/01/rdf-schema#label |
Man-in-the-Middle Attacks
|
gptkbp:involves |
Eavesdropping
Message Alteration |
gptkbp:mitigatedBy |
gptkb:VPNs
Intrusion Detection Systems Multi-Factor Authentication End-to-End Encryption Network Segmentation User Education Regular Software Updates Firewall Configuration Disabling Open Wi-Fi Disabling Unused Services Secure Protocols Strong Password Policies |
gptkbp:prevention |
public key infrastructure
Encryption Authentication Digital Certificates |
gptkbp:relatedTo |
ARP Spoofing
Replay Attacks DNS Spoofing Evil Twin Attack SSL Stripping |
gptkbp:target |
Data Transmission
DNS Requests Email Communications HTTPS Connections TLS/SSL Protocols VoIP Calls |
gptkbp:usedFor |
Data Manipulation
Credential Theft Session Hijacking |
gptkbp:bfsParent |
gptkb:DHCP_Snooping
gptkb:Certificate_Pinning |
gptkbp:bfsLayer |
7
|