The man in the middle attack requires that the connection between two computers be compromised.
This man in the middle captures and relays the information being passed between the originator and the target in order to glean information from the data.
Using secure authentication methods between computers, which repeatedly check for an authentication signature of some sort, will mitigate the man in the middle attack.
_________________________
Comments
Post a Comment