Categories
Managerial Economics Law Professional Communication for Pharmacists Economics Generic Geochemistry Management Information Systems American (United States) History Fuzzy Intelligence Business System Developmental Psychology Job and Internships The Physics of Everyday Life Data Communication and Computer Networks Engineering Advanced Computer Architecture Questions on universities Sociology Finance Internet and Java Programming Statistics for Psychologists Security Analysis Biology Object Oriented Programming Applied Physics Statistics and Economics Languages Literature and Communication Methods in Psychology Computer Fundamentals Analytical Chemistry Pharmacy Economic Theory Network Technologies and TCP/IP Psycology & Sociology Mathematics History & Philosophy Financial Management Law of Torts Effective Business Communication Consumer Behaviour Criminal Law History Biological Systems Computer Architecture Business Law Project Management Management Pyhsics and AstroPhysics On Docsity Advanced Physics Aerospace Engineering Psychology Biology & Chemistry Introduction to Business Operating System Soil Mechanics and Foundations Computer Programming Agronomy Introduction to the Science and Engg Medicine and Pharma Social Psychology Admission tests Fundamentals of Information Technology Political sciences Basic Electrical Engineering Communication Skills General Pharmacy Computer science Business Management Software Engineering Accounting Fundamentals of Operating Systems Botony Civil procedure Java Programming Digital electronics College Physics A Computer Graphics and Animation Human Resource Management English Grammar Statistics Biochemistry Physics Information System Analysis and Design United States Philosophy Political Science Engineering Materials Chemistry Business Administration Engineering Physics Boilers and Welding Biostatistics Behavioural Science Microeconomics Electronics and Communication

What is the difference between passive and active security threats?

0 votes

October 12th, 2012 10:01
in Data Communication and Computer Networks by sadayappan (Angelo State University (TX), Computer science)

What is the difference between passive and active security threats?

How can passive and active security threats differentiated?

6 Answers
0 votes

October 13th, 2012 10:29
beatryx (Kansas State University (KS), Databases)
"Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems."

Please log in or register to add a comment.

0 votes

November 1st, 2012 06:35
agrima (John Brown University (AR), Mathematics)
Passive voice episode: Consequently with passive episode the hack trespasses your digestive system, along with holds back for some valuable facts. An example may very well be: Some sort of keylogger which posts this suggestions provided by this victim to your nuller by way of a system(LAN as well as World-wide-web any(a)). "  

Please log in or register to add a comment.

0 votes

November 3rd, 2012 06:12
gaqruishta (Belmont Abbey College (NC), Electrical Engineering)
"Sorts of Passive attacksExamples connected with unaggressive assaults of which accumulate circle facts include the subsequent:·Community Research·Eavesdropping·Visitors Evaluation Common way of productive episodes can sometimes include these:· Masquerading ­ entails carrying out wildcat task by simply impersonating a legitimate"  

Please log in or register to add a comment.

0 votes

November 7th, 2012 09:34
ekaraj (Albright College (PA), Chemistry)
"There are 2 major families of problems: passive voice along with effective. ""Passive voice"" violence are that adversary faucets in to the technique and simply delays for a few info needed for being carried. ""Effective"" assaults are the types that opponent whitethorn release an active look for flaws inside your circle security measures. Info from any unaggressive tone-beginning can be utilised within an energetic invasion for you to commence a hostile rape. "  

Please log in or register to add a comment.

0 votes

November 7th, 2012 11:11
ekavaria (Angelo State University (TX), Chemistry)
In an energetic tone-beginning, your aggressor will try to avoid or maybe break into attached programs. This can be done via stealth, malware, viruses, or Trojan mounts. Active attacks admit tries to go around or even crack safeguard functions, flying insects detrimental signal, in order to take or adjust information.  

Please log in or register to add a comment.

0 votes

November 7th, 2012 12:21
eekbal (Randolph College (VA), Chemistry)
"Peaceful hazards will be the course of net problems requires searching for community selective information. Most of these inactive episodes can result in actual dynamic assaults or intrusions/penetrations in the organization's multilevel. Effective provocations come about as soon as enough multilevel information has become collected, the interloper will probably launch an actual tone-beginning against a new specific technique to either acquire complete command all over that will method or even enough command to be able to-bring about sure dangers for being noticed."

Please log in or register to add a comment.

Related questions
8 Answers
6 Answers
Answer
prindhorn (Massachusetts Institute of Technology (MIT) (MA), American literature)
6 Answers
Answer
paulina (City University of New York (NY), English literature)
6 Answers
Answer
fazal (Juniata College (PA), Technical writing)
Subjects