SELECT ?property ?value WHERE { BIND (?? AS ?s) ?s ?property ?value . FILTER (isLiteral(?value)) } LIMIT 1000

Attributes

MitMA
MitM
MitM
MitM
Cyberangriff, bei dem sich der Angreifer unbemerkt in den Kommunikationskanal zweier Partner hängt und dadurch deren Datenaustausch mitlesen oder verändern kann.
Cyberattack in which a hacker steals sensitive information by eavesdropping on communications between two online targets such as a user and a web application.
Cyberattaque au cours de laquelle une personne intercepte les communications entre deux parties, notamment à l'aide d'une clé cryptographique obtenue frauduleusement, ce qui lui permet de se faire passer pour l'une des parties, ou les deux, ou encore de récupérer des informations sensibles.
Attacco informatico in cui un hacker ruba informazioni sensibili intercettando le comunicazioni tra due obiettivi online come un utente e un'applicazione web.
Le Grand dictionnaire terminologique, "attaque par interception" ([Internet, 2025-07-01](https://vitrinelinguistique.oqlf.gouv.qc.ca/fiche-gdt/fiche/26542694/attaque-par-interception))
Fortinet, Attaque de l’homme du milieu : Types et exemples ([Internet, 2025-07-02](https://www.fortinet.com/fr/resources/cyberglossary/man-in-the-middle-attack))
CrowdStrike, Was ist ein Man-in-the-Middle-Angriff? ([Internet, 2025-07-02](https://www.crowdstrike.com/de-de/cybersecurity-101/cyberattacks/man-in-the-middle-mitm-attack/))
Fortinet, Attacco Man-in-the-Middle: Tipi ed esempi ([Internet, 2025-07-02](https://www.fortinet.com/it/resources/cyberglossary/man-in-the-middle-attack))
EXP: the attack can be made when two parties are communicating by using public or shared keys to have a secure communication; In both cases, the man in the middle has to intercept the exchange of the keys and establish two separate connections with different keys to both users. He then can read and alter all the messages and usually forwards them to the intended user by faking the key
Universität Bern, Man in the middle (MITM) attack ([Internet, 2025-07-01](http://home.inf.unibe.ch/~rvs/teaching/cn%20applets/Man_In_The_Middle_Attack_1/Man%20in%20the%20middle%20attack.pdf))
IBM, What is a man-in-the-middle (MITM) attack? ([Internet, 2025-07-01](https://www.ibm.com/think/topics/man-in-the-middle))
nach MELANI, Informationssicherung - Lage in der Schweiz un International, Halbjahresbericht 2018/I, S. 57 ([Internet, 2025-07-01](https://www.newsd.admin.ch/newsd/message/attachments/54408.pdf))
d'après Le Grand dictionnaire terminologique, "attaque par interception" ([Internet, 2025-07-01](https://vitrinelinguistique.oqlf.gouv.qc.ca/fiche-gdt/fiche/26542694/attaque-par-interception))
secondo IBM, Che cos'è un attacco man-in-the-middle (MITM)? ([Internet, 2025-07-01](https://www.ibm.com/it-it/think/topics/man-in-the-middle))
SELECT ?property ?object WHERE { BIND (?? AS ?s) ?s ?property ?object . FILTER (isIRI(?object)) FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000
Outgoing Relationships: No results found.
SELECT ?property ?subject WHERE { BIND (?? AS ?o) ?subject ?property ?o . FILTER (?property != rdf:type) FILTER (?property != rdfs:subClassOf) } LIMIT 1000

Incoming Relationships

property subject
has part man-in-the-middle attack
SELECT ?instance ?description WHERE { BIND (?? AS ?class) ?instance (rdf:type|owl:type) ?class . OPTIONAL { ?instance schema:description ?description . } } LIMIT 5000
Instances of this Class: No results found.
SELECT ?superclass ?description WHERE { ?? rdfs:subClassOf ?superclass . OPTIONAL { ?superclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Superclasses of this Class: No results found.
SELECT ?subclass ?description WHERE { ?subclass rdfs:subClassOf ?? . OPTIONAL { ?subclass (rdfs:comment|schema:description) ?description . } } LIMIT 5000
Subclasses of this Class: No results found.