Vorderseite | man in the middle attack |
---|---|
Rückseite | The interception, mimicking and/or altering and subsequent relaying of communications (e.g., credit card transactions) by a third party such that a user remains unaware of that third party?s presence. |
Learn with these flashcards. Click next, previous, or up to navigate to more flashcards for this subject.
Next card: Measure number category assigned attribute entity making measurement
Previous card: Deficiency non-fulfilment requirement related intended iso
Up to card list: ISTQB Glossary of Terms in Software testing