ASL STEM Logo

ASL STEM

Man In The Middle Sign Video

No video uploaded yet.

Definition

This term describes a variety of attacks that involve placing a malicious machine in the chain of network routers between a client and server, and using that machine to intercept and examine network traffic.

Source: Victoria Kirst, Jessica Miller, Marty Stepp, Web Programming: Step by Step, published by Lulu