Categories
Chemistry Generic Internet and Java Programming Botony On Docsity Economic Theory Network Technologies and TCP/IP Data Communication and Computer Networks College Physics A Biology & Chemistry Economics United States Philosophy Literature and Communication Job and Internships Questions on universities Biological Systems Engineering Physics Criminal Law Electronics and Communication Pyhsics and AstroPhysics Computer Graphics and Animation Introduction to Business Statistics Psychology Management Information Systems Software Engineering Fuzzy Intelligence Computer Architecture Computer Programming Business Law Soil Mechanics and Foundations Physics Advanced Physics Sociology Professional Communication for Pharmacists Applied Physics American (United States) History Management Biochemistry Law Java Programming Financial Management Advanced Computer Architecture History & Philosophy Digital electronics Operating System Managerial Economics Law of Torts Geochemistry Computer Fundamentals Business Administration Civil procedure Project Management Languages Psycology & Sociology Pharmacy Business Management English Grammar Aerospace Engineering Security Analysis Basic Electrical Engineering Statistics and Economics Analytical Chemistry Microeconomics Biology Mathematics Consumer Behaviour The Physics of Everyday Life Finance Information System Analysis and Design Social Psychology Effective Business Communication Communication Skills Object Oriented Programming Fundamentals of Operating Systems Computer science Behavioural Science History Developmental Psychology Engineering Boilers and Welding Methods in Psychology Human Resource Management Biostatistics Business System Political sciences Fundamentals of Information Technology Statistics for Psychologists Admission tests Engineering Materials General Pharmacy Accounting Medicine and Pharma Political Science Agronomy Introduction to the Science and Engg

What is the difference between passive and active security threats?

0 votes

October 12th, 2012 10:01
in Data Communication and Computer Networks by sadayappan (Angelo State University (TX), Computer science)

What is the difference between passive and active security threats?

How can passive and active security threats differentiated?

6 Answers
0 votes

October 13th, 2012 10:29
beatryx (Kansas State University (KS), Databases)
"Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems."

Please log in or register to add a comment.

0 votes

November 1st, 2012 06:35
agrima (John Brown University (AR), Mathematics)
Passive voice episode: Consequently with passive episode the hack trespasses your digestive system, along with holds back for some valuable facts. An example may very well be: Some sort of keylogger which posts this suggestions provided by this victim to your nuller by way of a system(LAN as well as World-wide-web any(a)). "  

Please log in or register to add a comment.

0 votes

November 3rd, 2012 06:12
gaqruishta (Belmont Abbey College (NC), Electrical Engineering)
"Sorts of Passive attacksExamples connected with unaggressive assaults of which accumulate circle facts include the subsequent:·Community Research·Eavesdropping·Visitors Evaluation Common way of productive episodes can sometimes include these:· Masquerading ­ entails carrying out wildcat task by simply impersonating a legitimate"  

Please log in or register to add a comment.

0 votes

November 7th, 2012 09:34
ekaraj (Albright College (PA), Chemistry)
"There are 2 major families of problems: passive voice along with effective. ""Passive voice"" violence are that adversary faucets in to the technique and simply delays for a few info needed for being carried. ""Effective"" assaults are the types that opponent whitethorn release an active look for flaws inside your circle security measures. Info from any unaggressive tone-beginning can be utilised within an energetic invasion for you to commence a hostile rape. "  

Please log in or register to add a comment.

0 votes

November 7th, 2012 11:11
ekavaria (Angelo State University (TX), Chemistry)
In an energetic tone-beginning, your aggressor will try to avoid or maybe break into attached programs. This can be done via stealth, malware, viruses, or Trojan mounts. Active attacks admit tries to go around or even crack safeguard functions, flying insects detrimental signal, in order to take or adjust information.  

Please log in or register to add a comment.

0 votes

November 7th, 2012 12:21
eekbal (Randolph College (VA), Chemistry)
"Peaceful hazards will be the course of net problems requires searching for community selective information. Most of these inactive episodes can result in actual dynamic assaults or intrusions/penetrations in the organization's multilevel. Effective provocations come about as soon as enough multilevel information has become collected, the interloper will probably launch an actual tone-beginning against a new specific technique to either acquire complete command all over that will method or even enough command to be able to-bring about sure dangers for being noticed."

Please log in or register to add a comment.

Related questions
8 Answers
6 Answers
Answer
prindhorn (Massachusetts Institute of Technology (MIT) (MA), American literature)
6 Answers
Answer
paulina (City University of New York (NY), English literature)
6 Answers
Answer
fazal (Juniata College (PA), Technical writing)
Subjects