Términos\Tercero interpuesto

Tercero interpuesto

Ver:

·         Ataque

principio

Técnica mediante la cual un tercero es capaz de interceptar, e incluso modificar, la comunicación entre dos extremos. [CCN-STIC-612:2006]

[CCN-STIC-671:2006]

principio

An attack on the authentication protocol run in which the Attacker positions himself or herself in between the Claimant and Verifier so that he can intercept and alter data traveling between them. [NIST-SP800-63:2013]

principio

A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data to masquerade as one or more of the entities involved in a communication association. [CNSSI_4009:2010]

principio

(I) A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data to masquerade as one or more of the entities involved in a communication association. (See: hijack attack, piggyback attack.) [RFC4949:2007]

principio

Active man-in-the-middle (MitM) is an attack method that allows an intruder to access sensitive information by intercepting and altering communications between the user of a public network and any requested website.

http://searchsecurity.techtarget.in/

principio

An attack where the message is intercepted and copied or modified before being transmitted to the intended recipient.

principio

An attacker places a machine between the authorised user and the system under attack, captures the I&A transactions as they are sent over the communications line and subsequently resends them as his/her own.

principio

In phishing, refers to using a fraudulent website as an intermediary between the victim and the legitimate website. The victim enters his or her banking information into the fraudulent site and is then redirected to the legitimate site, with little or no indication that anything is amiss.

principio

Menace passive correspondant à une personne qui, au sein d'un réseau, capte des informations numériques échangées entre deux personnes. Le Man in the Middle peut également être assimilée à une menace active, le Man in the Middle peut intercepter les informations, les modifier avant de les transmettre aux destinataire(s) initial(s) de l'information. Dans les deux cas, le Man in the Middle est invisible pour les entités intervenant dans la communication.

http://www.cases.public.lu/functions/glossaire/

principio