"man-in-the-middle attack" meaning in English

See man-in-the-middle attack in All languages combined, or Wiktionary

Noun

Forms: man-in-the-middle attacks [plural]
Head templates: {{en-noun}} man-in-the-middle attack (plural man-in-the-middle attacks)
  1. (computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device. Categories (topical): Computing
    Sense id: en-man-in-the-middle_attack-en-noun-y82B0Qv2 Categories (other): English entries with incorrect language header Topics: computing, engineering, mathematics, natural-sciences, physical-sciences, sciences

Inflected forms

Alternative forms

Download JSON data for man-in-the-middle attack meaning in English (2.0kB)

{
  "forms": [
    {
      "form": "man-in-the-middle attacks",
      "tags": [
        "plural"
      ]
    }
  ],
  "head_templates": [
    {
      "args": {},
      "expansion": "man-in-the-middle attack (plural man-in-the-middle attacks)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        {
          "kind": "other",
          "name": "English entries with incorrect language header",
          "parents": [
            "Entries with incorrect language header",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "topical",
          "langcode": "en",
          "name": "Computing",
          "orig": "en:Computing",
          "parents": [
            "Technology",
            "All topics",
            "Fundamental"
          ],
          "source": "w"
        }
      ],
      "examples": [
        {
          "ref": "2014, Emmett Dulaney, Security, page 324",
          "text": "Man-in-the-middle attacks clandestinely place something (such as a piece of software or a rouge router) between a server and the user about which neither the server's administrators nor the user is aware.",
          "type": "quotation"
        },
        {
          "ref": "2016, Ho-won Kim, Dooho Choi, Information Security Applications, page 70",
          "text": "In the general man-in-the-middle attack, the role of E in a tag access operation is to fake and forward data.",
          "type": "quotation"
        },
        {
          "ref": "2023, Eleanor Catton, Birnam Wood, page 76",
          "text": "It had taken Robert Lemoine barely twenty minutes to execute the man-in-the-middle attack.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "id": "en-man-in-the-middle_attack-en-noun-y82B0Qv2",
      "links": [
        [
          "computing",
          "computing#Noun"
        ]
      ],
      "qualifier": "security",
      "raw_glosses": [
        "(computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "topics": [
        "computing",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ]
    }
  ],
  "word": "man-in-the-middle attack"
}
{
  "forms": [
    {
      "form": "man-in-the-middle attacks",
      "tags": [
        "plural"
      ]
    }
  ],
  "head_templates": [
    {
      "args": {},
      "expansion": "man-in-the-middle attack (plural man-in-the-middle attacks)",
      "name": "en-noun"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "noun",
  "senses": [
    {
      "categories": [
        "English countable nouns",
        "English entries with incorrect language header",
        "English lemmas",
        "English multiword terms",
        "English nouns",
        "English terms with quotations",
        "en:Computing"
      ],
      "examples": [
        {
          "ref": "2014, Emmett Dulaney, Security, page 324",
          "text": "Man-in-the-middle attacks clandestinely place something (such as a piece of software or a rouge router) between a server and the user about which neither the server's administrators nor the user is aware.",
          "type": "quotation"
        },
        {
          "ref": "2016, Ho-won Kim, Dooho Choi, Information Security Applications, page 70",
          "text": "In the general man-in-the-middle attack, the role of E in a tag access operation is to fake and forward data.",
          "type": "quotation"
        },
        {
          "ref": "2023, Eleanor Catton, Birnam Wood, page 76",
          "text": "It had taken Robert Lemoine barely twenty minutes to execute the man-in-the-middle attack.",
          "type": "quotation"
        }
      ],
      "glosses": [
        "A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "links": [
        [
          "computing",
          "computing#Noun"
        ]
      ],
      "qualifier": "security",
      "raw_glosses": [
        "(computing, security) A security attack in which someone intercepts the communication between a device and the server it is connected to, simulating the device to the server and simulating the server to the device."
      ],
      "topics": [
        "computing",
        "engineering",
        "mathematics",
        "natural-sciences",
        "physical-sciences",
        "sciences"
      ]
    }
  ],
  "word": "man-in-the-middle attack"
}

This page is a part of the kaikki.org machine-readable English dictionary. This dictionary is based on structured data extracted on 2024-05-01 from the enwiktionary dump dated 2024-04-21 using wiktextract (f4fd8c9 and c9440ce). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.

If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.