What is a man in a middle attack?

Middle attacks are one of several devices that are used to get access to proprietary information, such as pass codes, credentials and credit card numbers. The process basically involves creating a virus that acts as an interface between two points. None of the parties on the stock exchange is aware that the exchange information is captured and captured by an intermediate virus.

The concept of a person in the middle of the attack is preceded by the establishment of a personal computer and the expanded use of the Internet. Even in earlier days, intelligence operations would take advantage of the idea of ​​establishing a third party that would actually initiate a dual interface with two other parties. Each of the other two parties would assume that they were involved in a direct connection with them without realizing that the third party captures, interprets and then passes on communication.

6 To ensure a public key for one of the parties on the stock exchange is an attacker to pretend to be this user. The attacker then sends his public key DBut he pretends to be the original party. From that point on, all information exchanged during the transaction is routed through an attacker who can copy the data for use later.

The key to a successful man in medium operation is to ensure that neither party is aware of the presence of the attacker. This means that the attacker has to take steps to maintain a low profile and not to attention to the fact that the data is directed by another step before reaching the intended goal. Unfortunately, when the replacement is not ensured, this is a difficult task.

There are several ways to fight a men in a middle attack. Over time, more robust methods of creating and verifying safe verification and coded public keys have been developed. Many banks came to the use of encrypted secondary data that must be verified before a transaction can occur. Online businesses started using methods such as secret keys to verify the actual identity of the customer overd by processing the order.

All these methods have helped minimize the impact of a person in the middle strategy. However, there are many websites that remain unprotected and are therefore vulnerable to this type of attack. For this reason, Internet users should never enter private information on any website if it is not possible to verify the authenticity and secure nature of the site first.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?