CCNA Security 210-260 Certification Guide
上QQ阅读APP看书,第一时间看更新

Threat action – interception

A threat action where an unauthorized user directly accesses critical data flowing between authorized sources and destinations. This includes the following:

  • Theft: Obtaining access to data by stealing media, such as HDD, CD/DVD Drives, and USB.
  • Wiretapping: Monitoring and storing the data flowing between two endpoints in the communication system with the aim of stealing the information.
  • Man-in-the-Middle (MiTM): Intercepts traffic between the sender and the destination. Sensitive information can be obtained.