Categories
Consumer Behaviour Economic Theory Advanced Physics Business Management Physics American (United States) History Electronics and Communication Statistics for Psychologists Biostatistics Human Resource Management Accounting The Physics of Everyday Life Advanced Computer Architecture Finance Boilers and Welding Internet and Java Programming Law Digital electronics Financial Management Fundamentals of Information Technology Business Law Biology Geochemistry Sociology Statistics Engineering Physics Security Analysis Agronomy United States Philosophy Biology & Chemistry Social Psychology Law of Torts Computer Fundamentals Basic Electrical Engineering History & Philosophy History Management Pyhsics and AstroPhysics Psycology & Sociology Statistics and Economics Business System Introduction to the Science and Engg Economics Admission tests College Physics A Introduction to Business Business Administration Generic Effective Business Communication Political sciences Applied Physics Project Management Methods in Psychology Botony Professional Communication for Pharmacists Criminal Law Psychology Fundamentals of Operating Systems Computer Graphics and Animation Fuzzy Intelligence Computer Architecture Managerial Economics Information System Analysis and Design Civil procedure Microeconomics Software Engineering English Grammar Object Oriented Programming Questions on universities Job and Internships Java Programming Literature and Communication Engineering Communication Skills Pharmacy Medicine and Pharma Soil Mechanics and Foundations Analytical Chemistry Biological Systems Chemistry Network Technologies and TCP/IP Data Communication and Computer Networks Computer Programming On Docsity Operating System Computer science Languages Political Science Mathematics Developmental Psychology Engineering Materials Behavioural Science General Pharmacy Aerospace Engineering Management Information Systems Biochemistry

Is there any one who can provide some passive attack types.

0 votes

November 28th, 2012 11:07
in Information System Analysis and Design by amoda (Adams State College (CO), Computer sciences)

Is there any one who can provide some passive attack types.

I'm preparing for an exam, can anyone please list the types of passive attacks.

6 Answers
0 votes

December 27th, 2012 10:55
rogerpapa (University of Hyderabad, General law)
"Types of Passive attacks_x000D_ Examples of passive attacks that gather network information include the following:_x000D_ - Network Analysis_x000D_ - Eavesdropping_x000D_ - Traffic Analysis_x000D_ _x000D_ _x000D_ Source: http://in.docsity.com/en-docs/Web_Security-Information_Security_and_Systems-Lecture_Notes_"

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:49
ekvir (Biju Patnaik University of Technology, Rourkela, Computers and algorithms)
A new peaceful assault using a cryptosystem is but one that cryptologist are not able to communicate with some of the events included, looking to break it entirely in relation to observed files (when i.age. the particular ciphertext). ...

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:55
ekyan (Biju Patnaik University of Technology, Rourkela, Computer science)
Assault which doesn't end in a great unauthorized physical change, like another panic attack in which alone(p) watches and/or even documents data.

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:30
ambika (Dhirubhai Ambani Institute of Information and Communication Technology, Artifical intelligence)
Panic or anxiety attack next to a hallmark method where the enemy intercepts information vacationing on the multilevel involving the complaintant and also verifier, but won't alter the data (my spouse and i.e. eavesdropping). ...

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:33
ambu (Ankit Institute of Technology and Science, Artifical intelligence)
A panic attack where the aggressor just eavesdrops in addition to attempts to psychoanalyze intercepted messages, in contrast to an energetic tone-beginning where they diverts communications or perhaps generates his own.

Please log in or register to add a comment.

0 votes

February 12th, 2013 10:47
anumati (Punjab Engineering College, Electrical Engineering)
Episode where data is observed although not modified. This can be the type of tone-beginning carried out by simply Peeping He.

Please log in or register to add a comment.

Related questions
6 Answers
6 Answers
Answer
amoda (Adams State College (CO), Computer sciences)
7 Answers
7 Answers
Subjects