Definitions for "Man-in-the-middle attack"
Keywords:  intercept, mitm, alice, bob, attack
An attack by which an unauthorized person intercepts a communication between Alice and Bob, pretending, for example, to be either Alice (to Bob) or Bob (to Alice). A powerful attack which can take on a number of forms but can be prevented by well constructed communication/authentication protocols. _____________________________________________________________________________
This term refers to an attack that is carried out by an intruder who is located between two communication parties and counterfeits data.
An "active" Internet attack, whereby the criminal attempts to intercept, read or alter information moving between two computers.