Categories
Advanced Physics Business Administration Business Law Software Engineering History & Philosophy Managerial Economics General Pharmacy Botony Computer Architecture American (United States) History Aerospace Engineering History Boilers and Welding Management Business Management Data Communication and Computer Networks Physics Computer science Effective Business Communication Economics Analytical Chemistry Applied Physics Questions on universities Economic Theory Advanced Computer Architecture Introduction to Business Computer Programming Java Programming Computer Fundamentals Methods in Psychology Law of Torts Electronics and Communication Engineering Materials Fundamentals of Operating Systems Business System Agronomy Financial Management Fundamentals of Information Technology Professional Communication for Pharmacists Medicine and Pharma Statistics for Psychologists Psycology & Sociology Accounting Information System Analysis and Design Computer Graphics and Animation Biochemistry Biology & Chemistry Engineering Languages Operating System Literature and Communication Finance On Docsity Basic Electrical Engineering Mathematics Biology Pyhsics and AstroPhysics Admission tests Soil Mechanics and Foundations Job and Internships Psychology The Physics of Everyday Life Communication Skills United States Philosophy Project Management Sociology Network Technologies and TCP/IP Political sciences Law English Grammar Chemistry Geochemistry Microeconomics Civil procedure Statistics and Economics Generic Security Analysis Consumer Behaviour Behavioural Science Pharmacy Engineering Physics Biostatistics Digital electronics Fuzzy Intelligence Management Information Systems Human Resource Management Criminal Law Biological Systems Introduction to the Science and Engg Social Psychology College Physics A Developmental Psychology Political Science Internet and Java Programming Statistics Object Oriented Programming

Is there any one who can provide some passive attack types.

0 votes

November 28th, 2012 11:07
in Information System Analysis and Design by amoda (Adams State College (CO), Computer sciences)

Is there any one who can provide some passive attack types.

I'm preparing for an exam, can anyone please list the types of passive attacks.

6 Answers
0 votes

December 27th, 2012 10:55
rogerpapa (University of Hyderabad, General law)
"Types of Passive attacks_x000D_ Examples of passive attacks that gather network information include the following:_x000D_ - Network Analysis_x000D_ - Eavesdropping_x000D_ - Traffic Analysis_x000D_ _x000D_ _x000D_ Source: http://in.docsity.com/en-docs/Web_Security-Information_Security_and_Systems-Lecture_Notes_"

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:49
ekvir (Biju Patnaik University of Technology, Rourkela, Computers and algorithms)
A new peaceful assault using a cryptosystem is but one that cryptologist are not able to communicate with some of the events included, looking to break it entirely in relation to observed files (when i.age. the particular ciphertext). ...

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:55
ekyan (Biju Patnaik University of Technology, Rourkela, Computer science)
Assault which doesn't end in a great unauthorized physical change, like another panic attack in which alone(p) watches and/or even documents data.

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:30
ambika (Dhirubhai Ambani Institute of Information and Communication Technology, Artifical intelligence)
Panic or anxiety attack next to a hallmark method where the enemy intercepts information vacationing on the multilevel involving the complaintant and also verifier, but won't alter the data (my spouse and i.e. eavesdropping). ...

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:33
ambu (Ankit Institute of Technology and Science, Artifical intelligence)
A panic attack where the aggressor just eavesdrops in addition to attempts to psychoanalyze intercepted messages, in contrast to an energetic tone-beginning where they diverts communications or perhaps generates his own.

Please log in or register to add a comment.

0 votes

February 12th, 2013 10:47
anumati (Punjab Engineering College, Electrical Engineering)
Episode where data is observed although not modified. This can be the type of tone-beginning carried out by simply Peeping He.

Please log in or register to add a comment.

Related questions
6 Answers
6 Answers
Answer
amoda (Adams State College (CO), Computer sciences)
7 Answers
7 Answers
Subjects