An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them.
Source(s):
NISTIR 7711
under Man-In-The-Middle