Categories
Generic Economics Social Psychology Operating System General Pharmacy Fundamentals of Operating Systems Internet and Java Programming Agronomy Engineering Materials Mathematics Statistics Digital electronics Computer Graphics and Animation Business Management Network Technologies and TCP/IP Aerospace Engineering Chemistry Microeconomics History Physics Law Analytical Chemistry Law of Torts Electronics and Communication Boilers and Welding Information System Analysis and Design Methods in Psychology Effective Business Communication Introduction to Business Questions on universities Advanced Computer Architecture Computer science Medicine and Pharma Introduction to the Science and Engg Computer Fundamentals Job and Internships Software Engineering Political Science Consumer Behaviour Applied Physics Geochemistry Computer Programming Languages Accounting Biostatistics Engineering Physics Basic Electrical Engineering Fundamentals of Information Technology Business System Project Management Admission tests Management Information Systems Biochemistry Management Behavioural Science Psychology Pyhsics and AstroPhysics Finance College Physics A Managerial Economics Professional Communication for Pharmacists Pharmacy Human Resource Management Fuzzy Intelligence English Grammar History & Philosophy Botony Computer Architecture The Physics of Everyday Life On Docsity Biological Systems Security Analysis Communication Skills Object Oriented Programming Psycology & Sociology American (United States) History Economic Theory Statistics and Economics Criminal Law Political sciences Soil Mechanics and Foundations Financial Management Statistics for Psychologists Engineering Sociology Developmental Psychology Biology Java Programming Business Administration Biology & Chemistry Literature and Communication Civil procedure United States Philosophy Advanced Physics Data Communication and Computer Networks Business Law

Is there any one who can provide some passive attack types.

0 votes

November 28th, 2012 11:07
in Information System Analysis and Design by amoda (Adams State College (CO), Computer sciences)

Is there any one who can provide some passive attack types.

I'm preparing for an exam, can anyone please list the types of passive attacks.

6 Answers
0 votes

December 27th, 2012 10:55
rogerpapa (University of Hyderabad, General law)
"Types of Passive attacks_x000D_ Examples of passive attacks that gather network information include the following:_x000D_ - Network Analysis_x000D_ - Eavesdropping_x000D_ - Traffic Analysis_x000D_ _x000D_ _x000D_ Source: http://in.docsity.com/en-docs/Web_Security-Information_Security_and_Systems-Lecture_Notes_"

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:49
ekvir (Biju Patnaik University of Technology, Rourkela, Computers and algorithms)
A new peaceful assault using a cryptosystem is but one that cryptologist are not able to communicate with some of the events included, looking to break it entirely in relation to observed files (when i.age. the particular ciphertext). ...

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:55
ekyan (Biju Patnaik University of Technology, Rourkela, Computer science)
Assault which doesn't end in a great unauthorized physical change, like another panic attack in which alone(p) watches and/or even documents data.

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:30
ambika (Dhirubhai Ambani Institute of Information and Communication Technology, Artifical intelligence)
Panic or anxiety attack next to a hallmark method where the enemy intercepts information vacationing on the multilevel involving the complaintant and also verifier, but won't alter the data (my spouse and i.e. eavesdropping). ...

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:33
ambu (Ankit Institute of Technology and Science, Artifical intelligence)
A panic attack where the aggressor just eavesdrops in addition to attempts to psychoanalyze intercepted messages, in contrast to an energetic tone-beginning where they diverts communications or perhaps generates his own.

Please log in or register to add a comment.

0 votes

February 12th, 2013 10:47
anumati (Punjab Engineering College, Electrical Engineering)
Episode where data is observed although not modified. This can be the type of tone-beginning carried out by simply Peeping He.

Please log in or register to add a comment.

Related questions
6 Answers
6 Answers
Answer
amoda (Adams State College (CO), Computer sciences)
7 Answers
7 Answers
Subjects