Categories
Political Science Advanced Computer Architecture Agronomy Microeconomics Economic Theory Business Administration Literature and Communication Computer science Medicine and Pharma Generic Physics Professional Communication for Pharmacists Sociology Biology & Chemistry Biological Systems Computer Graphics and Animation Digital electronics Biology Political sciences Operating System American (United States) History Management Analytical Chemistry Developmental Psychology Java Programming Boilers and Welding Job and Internships Pyhsics and AstroPhysics Computer Architecture Civil procedure Methods in Psychology Soil Mechanics and Foundations Law Data Communication and Computer Networks Engineering Materials Business System Managerial Economics Geochemistry Statistics for Psychologists English Grammar Applied Physics On Docsity Basic Electrical Engineering Computer Programming Questions on universities Pharmacy Fundamentals of Operating Systems Engineering Physics General Pharmacy Management Information Systems Engineering Security Analysis United States Philosophy Accounting Electronics and Communication Chemistry Network Technologies and TCP/IP Aerospace Engineering Object Oriented Programming Information System Analysis and Design Business Law Internet and Java Programming History & Philosophy Introduction to the Science and Engg Economics Fundamentals of Information Technology Computer Fundamentals History Consumer Behaviour Finance Software Engineering Effective Business Communication Fuzzy Intelligence Human Resource Management Statistics and Economics Business Management Financial Management The Physics of Everyday Life Botony Languages Introduction to Business Project Management Psycology & Sociology Communication Skills Admission tests College Physics A Law of Torts Biostatistics Criminal Law Psychology Biochemistry Statistics Behavioural Science Social Psychology Advanced Physics Mathematics

What is the difference between passive and active security threats?

0 votes

October 12th, 2012 10:01
in Data Communication and Computer Networks by sadayappan (Angelo State University (TX), Computer science)

What is the difference between passive and active security threats?

How can passive and active security threats differentiated?

6 Answers
0 votes

October 13th, 2012 10:29
beatryx (Kansas State University (KS), Databases)
"Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems."

Please log in or register to add a comment.

0 votes

November 1st, 2012 06:35
agrima (John Brown University (AR), Mathematics)
Passive voice episode: Consequently with passive episode the hack trespasses your digestive system, along with holds back for some valuable facts. An example may very well be: Some sort of keylogger which posts this suggestions provided by this victim to your nuller by way of a system(LAN as well as World-wide-web any(a)). "  

Please log in or register to add a comment.

0 votes

November 3rd, 2012 06:12
gaqruishta (Belmont Abbey College (NC), Electrical Engineering)
"Sorts of Passive attacksExamples connected with unaggressive assaults of which accumulate circle facts include the subsequent:·Community Research·Eavesdropping·Visitors Evaluation Common way of productive episodes can sometimes include these:· Masquerading ­ entails carrying out wildcat task by simply impersonating a legitimate"  

Please log in or register to add a comment.

0 votes

November 7th, 2012 09:34
ekaraj (Albright College (PA), Chemistry)
"There are 2 major families of problems: passive voice along with effective. ""Passive voice"" violence are that adversary faucets in to the technique and simply delays for a few info needed for being carried. ""Effective"" assaults are the types that opponent whitethorn release an active look for flaws inside your circle security measures. Info from any unaggressive tone-beginning can be utilised within an energetic invasion for you to commence a hostile rape. "  

Please log in or register to add a comment.

0 votes

November 7th, 2012 11:11
ekavaria (Angelo State University (TX), Chemistry)
In an energetic tone-beginning, your aggressor will try to avoid or maybe break into attached programs. This can be done via stealth, malware, viruses, or Trojan mounts. Active attacks admit tries to go around or even crack safeguard functions, flying insects detrimental signal, in order to take or adjust information.  

Please log in or register to add a comment.

0 votes

November 7th, 2012 12:21
eekbal (Randolph College (VA), Chemistry)
"Peaceful hazards will be the course of net problems requires searching for community selective information. Most of these inactive episodes can result in actual dynamic assaults or intrusions/penetrations in the organization's multilevel. Effective provocations come about as soon as enough multilevel information has become collected, the interloper will probably launch an actual tone-beginning against a new specific technique to either acquire complete command all over that will method or even enough command to be able to-bring about sure dangers for being noticed."

Please log in or register to add a comment.

Related questions
8 Answers
6 Answers
Answer
prindhorn (Massachusetts Institute of Technology (MIT) (MA), American literature)
6 Answers
Answer
paulina (City University of New York (NY), English literature)
6 Answers
Answer
fazal (Juniata College (PA), Technical writing)
Subjects