A man-in-the-middle attack is a type of cyberattack where an attacker intercepts and alters the communication between two parties who believe they are directly communicating with each other. In this case, the attacker is impersonating mail.google.com and presenting a fake certificate to the endpoint device. The endpoint device detects that the certificate is not issued by a trusted authority and displays an error message. The attacker can then monitor or modify the traffic between the endpoint device and mail.google.com. References:
200-201 CBROPS - Cisco, Exam Topics, 3.0 Host-Based Analysis, 3.2 Compare and contrast the functionality of these endpoint security technologies
Cisco Certified CyberOps Associate Overview - Cisco Learning Network, Videos, 3.2 Compare and contrast the functionality of these endpoint security technologies
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit