"man-in-the-middle attack" meaning in All languages combined

See man-in-the-middle attack on Wiktionary

Noun [English]

Forms: man-in-the-middle attacks [plural]
Head templates: {{en-noun}} man-in-the-middle attack (plural man-in-the-middle attacks)
  1. (computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device. Categories (topical): Computing
    Sense id: en-man-in-the-middle_attack-en-noun-y82B0Qv2 Categories (other): English entries with incorrect language header Topics: computing, engineering, mathematics, natural-sciences, physical-sciences, sciences

Inflected forms

Alternative forms

Download JSON data for man-in-the-middle attack meaning in All languages combined (2.0kB)

{
  "forms": [
    {
      "form": "man-in-the-middle attacks",
      "tags": [
        "plural"
      ]
    }
  ],
  "head_templates": [
    {
      "args": {},
      "expansion": "man-in-the-middle attack (plural man-in-the-middle attacks)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        {
          "kind": "other",
          "name": "English entries with incorrect language header",
          "parents": [
            "Entries with incorrect language header",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "topical",
          "langcode": "en",
          "name": "Computing",
          "orig": "en:Computing",
          "parents": [
            "Technology",
            "All topics",
            "Fundamental"
          ],
          "source": "w"
        }
      ],
      "examples": [
        {
          "ref": "2014, Emmett Dulaney, Security, page 324",
          "text": "Man-in-the-middle attacks clandestinely place something (such as a piece of software or a rouge router) between a server and the user about which neither the server's administrators nor the user is aware.",
          "type": "quotation"
        },
        {
          "ref": "2016, Ho-won Kim, Dooho Choi, Information Security Applications, page 70",
          "text": "In the general man-in-the-middle attack, the role of E in a tag access operation is to fake and forward data.",
          "type": "quotation"
        },
        {
          "ref": "2023, Eleanor Catton, Birnam Wood, page 76",
          "text": "It had taken Robert Lemoine barely twenty minutes to execute the man-in-the-middle attack.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "id": "en-man-in-the-middle_attack-en-noun-y82B0Qv2",
      "links": [
        [
          "computing",
          "computing#Noun"
        ]
      ],
      "qualifier": "security",
      "raw_glosses": [
        "(computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "topics": [
        "computing",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ]
    }
  ],
  "word": "man-in-the-middle attack"
}
{
  "forms": [
    {
      "form": "man-in-the-middle attacks",
      "tags": [
        "plural"
      ]
    }
  ],
  "head_templates": [
    {
      "args": {},
      "expansion": "man-in-the-middle attack (plural man-in-the-middle attacks)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        "English countable nouns",
        "English entries with incorrect language header",
        "English lemmas",
        "English multiword terms",
        "English nouns",
        "English terms with quotations",
        "en:Computing"
      ],
      "examples": [
        {
          "ref": "2014, Emmett Dulaney, Security, page 324",
          "text": "Man-in-the-middle attacks clandestinely place something (such as a piece of software or a rouge router) between a server and the user about which neither the server's administrators nor the user is aware.",
          "type": "quotation"
        },
        {
          "ref": "2016, Ho-won Kim, Dooho Choi, Information Security Applications, page 70",
          "text": "In the general man-in-the-middle attack, the role of E in a tag access operation is to fake and forward data.",
          "type": "quotation"
        },
        {
          "ref": "2023, Eleanor Catton, Birnam Wood, page 76",
          "text": "It had taken Robert Lemoine barely twenty minutes to execute the man-in-the-middle attack.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "links": [
        [
          "computing",
          "computing#Noun"
        ]
      ],
      "qualifier": "security",
      "raw_glosses": [
        "(computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "topics": [
        "computing",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ]
    }
  ],
  "word": "man-in-the-middle attack"
}

This page is a part of the kaikki.org machine-readable All languages combined dictionary. This dictionary is based on structured data extracted on 2024-05-10 from the enwiktionary dump dated 2024-05-02 using wiktextract (a644e18 and edd475d). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.

If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.