An attack strategy used in a man-in-the-middle to steal data during data transfers between two network locations.

Susan Morrow
- CYBERSECURITY TERMS
Talk to our Team today

An attack strategy used in a man-in-the-middle to steal data during data transfers between two network locations.
Susan Morrow