DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
wer
soft
wa
re
OS
s
an
d
lan
gua
ges

. M a n - i n - t h e - m i d d l e


Attackers insert themselves between two
endpoints (such as a browser and a web
server) and intercept or modify
communications between the two. The
attackers can then collect information as
well as impersonate either of the two agents.
In addition to targeting websites, these
attacks can target email communications,
DNS lookups, and public Wi-Fi networks.

Ad
opt
a
Sec
ure
Soc
ket
s
Lay
er
(SS
L)/
Tra
nsp
ort
Lay
er
Sec
urit
y
(TL
S)
str
ate
gy
for
bot
h
we
b
an
d
em
ail.
Free download pdf