SELECT ?property ?value WHERE { BIND (?? AS ?s) ?s ?property ?value . FILTER (isLiteral(?value)) } LIMIT 1000

Attributes

man-in-the-middle attack
attacco man-in-the-middle
Man-in-the-Middle-Angriff
attaque de l’homme du milieu
Cyberangriff, bei dem sich der Angreifer unbemerkt in den Kommunikationskanal zweier Partner hängt und dadurch deren Datenaustausch mitlesen oder verändern kann.
Cyberattack in which a hacker steals sensitive information by eavesdropping on communications between two online targets such as a user and a web application.
Cyberattaque au cours de laquelle une personne intercepte les communications entre deux parties, notamment à l'aide d'une clé cryptographique obtenue frauduleusement, ce qui lui permet de se faire passer pour l'une des parties, ou les deux, ou encore de récupérer des informations sensibles.
Attacco informatico in cui un hacker ruba informazioni sensibili intercettando le comunicazioni tra due obiettivi online come un utente e un'applicazione web.
2025-10-28T09:36:41.5561650Z
309776
https://www.termdat.bk.admin.ch/entry/309776
IBM, What is a man-in-the-middle (MITM) attack? ([Internet, 2025-07-01](https://www.ibm.com/think/topics/man-in-the-middle))
IBM, Che cos'è un attacco man-in-the-middle (MITM)? ([Internet, 2025-07-01](https://www.ibm.com/it-it/think/topics/man-in-the-middle))
Fortinet, Man-in-the-Middle-Angriff: Arten und Beispiele ([Internet, 2025-07-02](https://www.fortinet.com/de/resources/cyberglossary/man-in-the-middle-attack))
Fortinet, Attaque de l’homme du milieu : Types et exemples ([Internet, 2025-07-02](https://www.fortinet.com/fr/resources/cyberglossary/man-in-the-middle-attack))
EXP: the attack can be made when two parties are communicating by using public or shared keys to have a secure communication; In both cases, the man in the middle has to intercept the exchange of the keys and establish two separate connections with different keys to both users. He then can read and alter all the messages and usually forwards them to the intended user by faking the key
Universität Bern, Man in the middle (MITM) attack ([Internet, 2025-07-01](http://home.inf.unibe.ch/~rvs/teaching/cn%20applets/Man_In_The_Middle_Attack_1/Man%20in%20the%20middle%20attack.pdf))
IBM, What is a man-in-the-middle (MITM) attack? ([Internet, 2025-07-01](https://www.ibm.com/think/topics/man-in-the-middle))
nach MELANI, Informationssicherung - Lage in der Schweiz un International, Halbjahresbericht 2018/I, S. 57 ([Internet, 2025-07-01](https://www.newsd.admin.ch/newsd/message/attachments/54408.pdf))
d'après Le Grand dictionnaire terminologique, "attaque par interception" ([Internet, 2025-07-01](https://vitrinelinguistique.oqlf.gouv.qc.ca/fiche-gdt/fiche/26542694/attaque-par-interception))
secondo IBM, Che cos'è un attacco man-in-the-middle (MITM)? ([Internet, 2025-07-01](https://www.ibm.com/it-it/think/topics/man-in-the-middle))
SELECT ?property ?object WHERE { BIND (?? AS ?s) ?s ?property ?object . FILTER (isIRI(?object)) FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
SELECT ?property ?subject WHERE { BIND (?? AS ?o) ?subject ?property ?o . FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
Incoming Relationships: No results found.
SELECT ?instance ?description WHERE { BIND (?? AS ?class) ?instance (rdf:type|owl:type) ?class . OPTIONAL { ?instance schema:description ?description . } } LIMIT 5000
Instances of this Class: No results found.
SELECT ?superclass ?description WHERE { ?? rdfs:subClassOf ?superclass . OPTIONAL { ?superclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Superclasses of this Class: No results found.
SELECT ?subclass ?description WHERE { ?subclass rdfs:subClassOf ?? . OPTIONAL { ?subclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Subclasses of this Class: No results found.