Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

CYBER SMART: What type of attack impersonates both parties to access info?

Written by Jordan True

September 9th, 2016

Answer: Man-in-the-Middle Attack

Watch out! This attack allows a malicious actor to alter or relay information between two parties who believe they are communicating directly with each other. It is also known as a type of “Eavesdropping” attack. Learn about other types of cyber attacks and the ABCs of Cybersecurity here.

 

Are you an InfoSec trivia guru?

Each Friday we’ll test your InfoSec knowledge! Whether you’re new to the industry or a seasoned InfoSec veteran, these questions will get your circuits reeling. Questions are posted on social media every Friday.

SHARE THIS


The following two tabs change content below.

Jordan True

Jordan is a social media strategist, digital community manager and a lover of all things IT. She currently manages the Social Media Program at Thycotic and loves to connect with technology communities online and at enterprise IT events. Addicted to the outdoors, you can find Jordan on the running trails in her free time or sharing the latest InfoSec buzz on Twitter @ThycoticJordan.