This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. | Man-in-the-middle-attack Understanding in simple words International Journal of Data and Network Science 3 2019 77 92 Contents lists available at GrowingScience International Journal of Data and Network Science homepage ijds Man-in-the-middle-attack Understanding in simple words Avijit Mallika Abid Ahsanb Mhia Md. Zaglul Shahadata and Jia-Chi Tsouc a Department of Mechanical Engineering RUET Rajshahi-6204 Bangladesh b Department of Computer Science and Engineering RUET Rajshahi-6204 Bangladesh c Department of Business Administration China University of Technology Taipei City Taiwan CHRONICLE ABSTRACT Article history These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A Received September 18 2018 man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an Received in revised format Octo- online correspondence between two users remains escaped the two parties. The malware that is ber 20 2018 in the middle-attack often monitors and changes individual classified information that was just Accepted January 2 2019 Available online realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider January 2 2019 inside the system which can access read and change secret information without keeping any tress Keywords of manipulation. This issue is intense and most of the cryptographic systems without having a MITM attack decent authentication security are threatened to be hacked by the malware named men-in-the- Cyberattack middle-attack MITM MIM . This paper essentially includes the view of understanding the term Crime of men-in-the-middle-attack the current work is mainly emphasized to accumulate related Media data information in a single article so that it can be a reference to conduct research further on this topic at college undergraduate level. This paper likewise audits most cited research and survey articles on man-in-the-middle-attack .