Which of the following best describes an attack where an adversary intercepts legitimate communication between two parties to fraudulently gain or manipulate information, without either of the original parties being aware?
Amplification attack
Brute force attack
Eavesdropping
Relay attack