Categories
Applied Physics Questions on universities Sociology Management History & Philosophy Economic Theory Economics Managerial Economics Analytical Chemistry Aerospace Engineering Introduction to the Science and Engg Computer Architecture Physics Microeconomics Biochemistry Law of Torts Computer Fundamentals Methods in Psychology Psycology & Sociology Project Management Chemistry Engineering Materials Boilers and Welding Political sciences Law Fundamentals of Information Technology Pharmacy Statistics and Economics Biology Consumer Behaviour Software Engineering Java Programming Electronics and Communication Political Science Computer Graphics and Animation Advanced Computer Architecture Generic Statistics for Psychologists Business Law Computer science Digital electronics Business Administration Biology & Chemistry Management Information Systems On Docsity United States Philosophy Finance Mathematics Basic Electrical Engineering Geochemistry Agronomy Social Psychology Business Management General Pharmacy Professional Communication for Pharmacists Communication Skills Psychology Biostatistics Data Communication and Computer Networks Fuzzy Intelligence Human Resource Management Admission tests American (United States) History History Accounting Network Technologies and TCP/IP English Grammar The Physics of Everyday Life Financial Management Soil Mechanics and Foundations Information System Analysis and Design Engineering Effective Business Communication Developmental Psychology Engineering Physics Pyhsics and AstroPhysics Literature and Communication Computer Programming Criminal Law Statistics Botony Introduction to Business Object Oriented Programming Civil procedure Operating System Fundamentals of Operating Systems Job and Internships Security Analysis Internet and Java Programming Biological Systems Business System Languages Medicine and Pharma Behavioural Science College Physics A Advanced Physics

Is there any one who can provide some passive attack types.

0 votes

November 28th, 2012 11:07
in Information System Analysis and Design by amoda (Adams State College (CO), Computer sciences)

Is there any one who can provide some passive attack types.

I'm preparing for an exam, can anyone please list the types of passive attacks.

6 Answers
0 votes

December 27th, 2012 10:55
rogerpapa (University of Hyderabad, General law)
"Types of Passive attacks_x000D_ Examples of passive attacks that gather network information include the following:_x000D_ - Network Analysis_x000D_ - Eavesdropping_x000D_ - Traffic Analysis_x000D_ _x000D_ _x000D_ Source: http://in.docsity.com/en-docs/Web_Security-Information_Security_and_Systems-Lecture_Notes_"

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:49
ekvir (Biju Patnaik University of Technology, Rourkela, Computers and algorithms)
A new peaceful assault using a cryptosystem is but one that cryptologist are not able to communicate with some of the events included, looking to break it entirely in relation to observed files (when i.age. the particular ciphertext). ...

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:55
ekyan (Biju Patnaik University of Technology, Rourkela, Computer science)
Assault which doesn't end in a great unauthorized physical change, like another panic attack in which alone(p) watches and/or even documents data.

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:30
ambika (Dhirubhai Ambani Institute of Information and Communication Technology, Artifical intelligence)
Panic or anxiety attack next to a hallmark method where the enemy intercepts information vacationing on the multilevel involving the complaintant and also verifier, but won't alter the data (my spouse and i.e. eavesdropping). ...

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:33
ambu (Ankit Institute of Technology and Science, Artifical intelligence)
A panic attack where the aggressor just eavesdrops in addition to attempts to psychoanalyze intercepted messages, in contrast to an energetic tone-beginning where they diverts communications or perhaps generates his own.

Please log in or register to add a comment.

0 votes

February 12th, 2013 10:47
anumati (Punjab Engineering College, Electrical Engineering)
Episode where data is observed although not modified. This can be the type of tone-beginning carried out by simply Peeping He.

Please log in or register to add a comment.

Related questions
6 Answers
6 Answers
Answer
amoda (Adams State College (CO), Computer sciences)
7 Answers
7 Answers
Subjects