Man-In-The-Middle

CYBERSECURITY INFORMATION

How does it happen?

Video Transcript
Graphic showing a man-in-the-middle attack in action

What is a man-in-the-middle attack?

A man-in-the-middle attack is when an attacker positions themselves between two communicating parties and intercepts or modifies communications between the two parties.

How does a man-in-the-middle attack happen?

Let’s take Bob for example. Bob emails his banking information to his client for payment.

A hacker intercepts this information and replaces Bob’s banking information with his own and forwards the message to Bob’s client.

anti-virus

Not suspecting anything, the client processes the payment, but the funds are deposited into the attacker’s account.

Here are a few tips on how to help protect yourself from a man-in-the-middle attack.

First, if you’re going to wirelessly connect to the Internet, it’s highly recommended you use WPA2 encryption. This helps to secure your network.

Next, it is highly recommended you use a virtual private network, or VPN. This helps protect your identity online and encrypts your internet traffic.

Lastly, when visiting websites, it’s highly recommended you force the use HTTPS whenever possible.

CMMC Video

Man-in-the-Middle informational video

Scroll to top