Statements (50)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Cyberattack
|
gptkbp:affects |
Wi-Fi connections
Network traffic Email communication Web sessions |
gptkbp:alsoKnownAs |
MITM attacks
|
gptkbp:cause |
Identity theft
Unauthorized access Data theft Financial loss Credential compromise |
gptkbp:describedBy |
gptkb:NIST_guidelines
Security standards Cybersecurity literature OWASP documentation |
gptkbp:detects |
Certificate validation
Intrusion detection systems Network monitoring Anomaly detection |
gptkbp:exploits |
gptkb:ARP_spoofing
DNS spoofing Phishing Session hijacking Email interception SSL stripping Unsecured Wi-Fi Weak encryption |
https://www.w3.org/2000/01/rdf-schema#label |
Man-in-the-middle attacks
|
gptkbp:involves |
Eavesdropping
Message alteration Message interception |
gptkbp:prevention |
gptkb:TLS/SSL
gptkb:VPNs Encryption Secure key exchange Mutual authentication Certificate pinning |
gptkbp:relatedTo |
Phishing
Eavesdropping Session hijacking Spoofing Replay attacks |
gptkbp:target |
Communication channels
|
gptkbp:usedBy |
gptkb:Hackers
Cybercriminals State actors Penetration testers |
gptkbp:bfsParent |
gptkb:SMB_Encryption
gptkb:Zanti |
gptkbp:bfsLayer |
7
|