See man-in-the-middle attack on Wiktionary
{ "forms": [ { "form": "man-in-the-middle attacks", "tags": [ "plural" ] } ], "head_templates": [ { "args": {}, "expansion": "man-in-the-middle attack (plural man-in-the-middle attacks)", "name": "en-noun" } ], "lang": "English", "lang_code": "en", "pos": "noun", "senses": [ { "categories": [ { "kind": "other", "name": "English entries with incorrect language header", "parents": [ "Entries with incorrect language header", "Entry maintenance" ], "source": "w" }, { "kind": "other", "name": "Pages with 1 entry", "parents": [], "source": "w" }, { "kind": "other", "name": "Pages with entries", "parents": [], "source": "w" }, { "kind": "topical", "langcode": "en", "name": "Computing", "orig": "en:Computing", "parents": [ "Technology", "All topics", "Fundamental" ], "source": "w" } ], "examples": [ { "ref": "2014, Emmett Dulaney, Security, page 324:", "text": "Man-in-the-middle attacks clandestinely place something (such as a piece of software or a rouge router) between a server and the user about which neither the server's administrators nor the user is aware.", "type": "quote" }, { "ref": "2016, Ho-won Kim, Dooho Choi, Information Security Applications, page 70:", "text": "In the general man-in-the-middle attack, the role of E in a tag access operation is to fake and forward data.", "type": "quote" }, { "ref": "2023, Eleanor Catton, Birnam Wood, page 76:", "text": "It had taken Robert Lemoine barely twenty minutes to execute the man-in-the-middle attack.", "type": "quote" } ], "glosses": [ "A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device." ], "id": "en-man-in-the-middle_attack-en-noun-y82B0Qv2", "links": [ [ "computing", "computing#Noun" ] ], "qualifier": "security", "raw_glosses": [ "(computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device." ], "topics": [ "computing", "engineering", "mathematics", "natural-sciences", "physical-sciences", "sciences" ] } ], "word": "man-in-the-middle attack" }
{ "forms": [ { "form": "man-in-the-middle attacks", "tags": [ "plural" ] } ], "head_templates": [ { "args": {}, "expansion": "man-in-the-middle attack (plural man-in-the-middle attacks)", "name": "en-noun" } ], "lang": "English", "lang_code": "en", "pos": "noun", "senses": [ { "categories": [ "English countable nouns", "English entries with incorrect language header", "English lemmas", "English multiword terms", "English nouns", "English terms with quotations", "Pages with 1 entry", "Pages with entries", "en:Computing" ], "examples": [ { "ref": "2014, Emmett Dulaney, Security, page 324:", "text": "Man-in-the-middle attacks clandestinely place something (such as a piece of software or a rouge router) between a server and the user about which neither the server's administrators nor the user is aware.", "type": "quote" }, { "ref": "2016, Ho-won Kim, Dooho Choi, Information Security Applications, page 70:", "text": "In the general man-in-the-middle attack, the role of E in a tag access operation is to fake and forward data.", "type": "quote" }, { "ref": "2023, Eleanor Catton, Birnam Wood, page 76:", "text": "It had taken Robert Lemoine barely twenty minutes to execute the man-in-the-middle attack.", "type": "quote" } ], "glosses": [ "A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device." ], "links": [ [ "computing", "computing#Noun" ] ], "qualifier": "security", "raw_glosses": [ "(computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device." ], "topics": [ "computing", "engineering", "mathematics", "natural-sciences", "physical-sciences", "sciences" ] } ], "word": "man-in-the-middle attack" }
Download raw JSONL data for man-in-the-middle attack meaning in All languages combined (1.8kB)
This page is a part of the kaikki.org machine-readable All languages combined dictionary. This dictionary is based on structured data extracted on 2025-01-15 from the enwiktionary dump dated 2025-01-01 using wiktextract (b941637 and 4230888). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.
If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.