{"id":7855,"date":"2022-05-19T13:12:44","date_gmt":"2022-05-19T07:42:44","guid":{"rendered":"https:\/\/brilyant.sometech.work\/?post_type=glossary&#038;p=7855"},"modified":"2022-05-19T13:12:44","modified_gmt":"2022-05-19T07:42:44","slug":"man-in-the-middle-attack","status":"publish","type":"glossary","link":"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/","title":{"rendered":"Man-in-the-Middle Attack"},"content":{"rendered":"\n<p>A man-in-the-middle attack requires three players. There\u2019s the victim, the entity with which the victim is trying to communicate, and the \u201cman in the middle,\u201d who\u2019s intercepting the victim\u2019s communications. Critical to the scenario is that the victim isn\u2019t aware of the man in the middle.<\/p>\n","protected":false},"featured_media":0,"template":"","categories":[46],"tags":[],"class_list":["post-7855","glossary","type-glossary","status-publish","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Man-in-the-Middle Attack - USA<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Man-in-the-Middle Attack - USA\" \/>\n<meta property=\"og:description\" content=\"A man-in-the-middle attack requires three players. There\u2019s the victim, the entity with which the victim is trying to communicate, and the \u201cman in the middle,\u201d who\u2019s intercepting the victim\u2019s communications. Critical to the scenario is that the victim isn\u2019t aware of the man in the middle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"USA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/\",\"url\":\"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/\",\"name\":\"Man-in-the-Middle Attack - USA\",\"isPartOf\":{\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/#website\"},\"datePublished\":\"2022-05-19T07:42:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/brilyant.sometech.work\/usa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Man-in-the-Middle Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/#website\",\"url\":\"https:\/\/brilyant.sometech.work\/usa\/\",\"name\":\"USA\",\"description\":\"Managed Services Provider in India\",\"publisher\":{\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/brilyant.sometech.work\/usa\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/#organization\",\"name\":\"USA\",\"url\":\"https:\/\/brilyant.sometech.work\/usa\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/brilyant.sometech.work\/usa\/wp-content\/uploads\/sites\/2\/2021\/10\/cropped-Screenshot-2021-10-07-at-5.07.22-PM-e1640607182505.png\",\"contentUrl\":\"https:\/\/brilyant.sometech.work\/usa\/wp-content\/uploads\/sites\/2\/2021\/10\/cropped-Screenshot-2021-10-07-at-5.07.22-PM-e1640607182505.png\",\"width\":933,\"height\":139,\"caption\":\"USA\"},\"image\":{\"@id\":\"https:\/\/brilyant.sometech.work\/usa\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Man-in-the-Middle Attack - USA","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Man-in-the-Middle Attack - USA","og_description":"A man-in-the-middle attack requires three players. There\u2019s the victim, the entity with which the victim is trying to communicate, and the \u201cman in the middle,\u201d who\u2019s intercepting the victim\u2019s communications. Critical to the scenario is that the victim isn\u2019t aware of the man in the middle.","og_url":"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/","og_site_name":"USA","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/","url":"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/","name":"Man-in-the-Middle Attack - USA","isPartOf":{"@id":"https:\/\/brilyant.sometech.work\/usa\/#website"},"datePublished":"2022-05-19T07:42:44+00:00","breadcrumb":{"@id":"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/man-in-the-middle-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/brilyant.sometech.work\/usa\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/brilyant.sometech.work\/usa\/resources\/glossary\/"},{"@type":"ListItem","position":3,"name":"Man-in-the-Middle Attack"}]},{"@type":"WebSite","@id":"https:\/\/brilyant.sometech.work\/usa\/#website","url":"https:\/\/brilyant.sometech.work\/usa\/","name":"USA","description":"Managed Services Provider in India","publisher":{"@id":"https:\/\/brilyant.sometech.work\/usa\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/brilyant.sometech.work\/usa\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/brilyant.sometech.work\/usa\/#organization","name":"USA","url":"https:\/\/brilyant.sometech.work\/usa\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/brilyant.sometech.work\/usa\/#\/schema\/logo\/image\/","url":"https:\/\/brilyant.sometech.work\/usa\/wp-content\/uploads\/sites\/2\/2021\/10\/cropped-Screenshot-2021-10-07-at-5.07.22-PM-e1640607182505.png","contentUrl":"https:\/\/brilyant.sometech.work\/usa\/wp-content\/uploads\/sites\/2\/2021\/10\/cropped-Screenshot-2021-10-07-at-5.07.22-PM-e1640607182505.png","width":933,"height":139,"caption":"USA"},"image":{"@id":"https:\/\/brilyant.sometech.work\/usa\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/glossary\/7855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/types\/glossary"}],"version-history":[{"count":1,"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/glossary\/7855\/revisions"}],"predecessor-version":[{"id":7856,"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/glossary\/7855\/revisions\/7856"}],"wp:attachment":[{"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/media?parent=7855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/categories?post=7855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brilyant.sometech.work\/usa\/wp-json\/wp\/v2\/tags?post=7855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}