Categories
Engineering Physics Social Psychology Biological Systems Management Information Systems Managerial Economics Analytical Chemistry Soil Mechanics and Foundations Statistics for Psychologists Law of Torts Medicine and Pharma Political Science Law Psycology & Sociology Pharmacy Computer Programming American (United States) History Physics Operating System United States Philosophy College Physics A History Admission tests Computer Fundamentals Agronomy Network Technologies and TCP/IP Economics Chemistry Behavioural Science Accounting Geochemistry Introduction to Business Business Administration Business System Fuzzy Intelligence Java Programming Microeconomics Criminal Law Biostatistics Literature and Communication Software Engineering Business Management The Physics of Everyday Life Fundamentals of Operating Systems Professional Communication for Pharmacists English Grammar Management Computer science Biology Job and Internships Statistics Electronics and Communication Languages Applied Physics Advanced Physics Economic Theory Data Communication and Computer Networks Advanced Computer Architecture Psychology Methods in Psychology Information System Analysis and Design On Docsity Communication Skills Pyhsics and AstroPhysics Generic Biology & Chemistry Developmental Psychology Digital electronics Fundamentals of Information Technology Questions on universities Human Resource Management Engineering Computer Architecture Sociology Effective Business Communication Biochemistry Boilers and Welding History & Philosophy Civil procedure Financial Management Object Oriented Programming Statistics and Economics Introduction to the Science and Engg Finance Business Law Security Analysis General Pharmacy Basic Electrical Engineering Aerospace Engineering Engineering Materials Political sciences Computer Graphics and Animation Internet and Java Programming Consumer Behaviour Project Management Mathematics Botony

Is there any one who can provide some passive attack types.

0 votes

November 28th, 2012 11:07
in Information System Analysis and Design by amoda (Adams State College (CO), Computer sciences)

Is there any one who can provide some passive attack types.

I'm preparing for an exam, can anyone please list the types of passive attacks.

6 Answers
0 votes

December 27th, 2012 10:55
rogerpapa (University of Hyderabad, General law)
"Types of Passive attacks_x000D_ Examples of passive attacks that gather network information include the following:_x000D_ - Network Analysis_x000D_ - Eavesdropping_x000D_ - Traffic Analysis_x000D_ _x000D_ _x000D_ Source: http://in.docsity.com/en-docs/Web_Security-Information_Security_and_Systems-Lecture_Notes_"

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:49
ekvir (Biju Patnaik University of Technology, Rourkela, Computers and algorithms)
A new peaceful assault using a cryptosystem is but one that cryptologist are not able to communicate with some of the events included, looking to break it entirely in relation to observed files (when i.age. the particular ciphertext). ...

Please log in or register to add a comment.

0 votes

February 11th, 2013 07:55
ekyan (Biju Patnaik University of Technology, Rourkela, Computer science)
Assault which doesn't end in a great unauthorized physical change, like another panic attack in which alone(p) watches and/or even documents data.

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:30
ambika (Dhirubhai Ambani Institute of Information and Communication Technology, Artifical intelligence)
Panic or anxiety attack next to a hallmark method where the enemy intercepts information vacationing on the multilevel involving the complaintant and also verifier, but won't alter the data (my spouse and i.e. eavesdropping). ...

Please log in or register to add a comment.

0 votes

February 12th, 2013 06:33
ambu (Ankit Institute of Technology and Science, Artifical intelligence)
A panic attack where the aggressor just eavesdrops in addition to attempts to psychoanalyze intercepted messages, in contrast to an energetic tone-beginning where they diverts communications or perhaps generates his own.

Please log in or register to add a comment.

0 votes

February 12th, 2013 10:47
anumati (Punjab Engineering College, Electrical Engineering)
Episode where data is observed although not modified. This can be the type of tone-beginning carried out by simply Peeping He.

Please log in or register to add a comment.

Related questions
6 Answers
6 Answers
Answer
amoda (Adams State College (CO), Computer sciences)
7 Answers
7 Answers
Subjects