Statements (30)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:terrorism
|
gptkbp:countermeasures |
network monitoring
intrusion detection systems firewalls user education strong authentication |
gptkbp:description |
A security breach where a third party intercepts communication between two parties.
|
gptkbp:example |
DNS spoofing
session hijacking SSL stripping Wi-Fi eavesdropping email interception |
https://www.w3.org/2000/01/rdf-schema#label |
Man in the Middle
|
gptkbp:impact |
financial loss
identity theft data theft |
gptkbp:prevention |
VPNs
certificate pinning using HTTPS |
gptkbp:related_concept |
gptkb:virus
network security social engineering phishing spoofing |
gptkbp:related_to |
cybersecurity
encryption data interception |
gptkbp:bfsParent |
gptkb:John_Amaechi
gptkb:Black_Country_Communion |
gptkbp:bfsLayer |
6
|