Categories
Engineering Materials Political Science Biology Botony Criminal Law Business Management On Docsity Engineering Law Data Communication and Computer Networks Fundamentals of Operating Systems Developmental Psychology Introduction to Business Economics Accounting Java Programming Psychology Soil Mechanics and Foundations Computer Fundamentals Sociology Project Management Languages Computer Programming Methods in Psychology Agronomy Management Statistics for Psychologists The Physics of Everyday Life Professional Communication for Pharmacists Managerial Economics Basic Electrical Engineering American (United States) History United States Philosophy Physics Advanced Physics Biology & Chemistry Computer science Security Analysis Statistics and Economics Economic Theory Business Administration Business Law Pharmacy Generic Chemistry Network Technologies and TCP/IP Civil procedure Advanced Computer Architecture Applied Physics Behavioural Science Financial Management Geochemistry Software Engineering Fundamentals of Information Technology Boilers and Welding Operating System Internet and Java Programming Questions on universities Admission tests Management Information Systems Communication Skills Fuzzy Intelligence Object Oriented Programming English Grammar Finance Mathematics Medicine and Pharma Literature and Communication Business System General Pharmacy Job and Internships Pyhsics and AstroPhysics Psycology & Sociology Biochemistry Information System Analysis and Design Aerospace Engineering Human Resource Management Microeconomics Statistics Biostatistics Effective Business Communication Introduction to the Science and Engg Analytical Chemistry Law of Torts Electronics and Communication Political sciences History Engineering Physics History & Philosophy Digital electronics Computer Architecture Consumer Behaviour College Physics A Biological Systems Computer Graphics and Animation Social Psychology

What is the difference between passive and active security threats?

0 votes

October 12th, 2012 10:01
in Data Communication and Computer Networks by sadayappan (Angelo State University (TX), Computer science)

What is the difference between passive and active security threats?

How can passive and active security threats differentiated?

6 Answers
0 votes

October 13th, 2012 10:29
beatryx (Kansas State University (KS), Databases)
"Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems."

Please log in or register to add a comment.

0 votes

November 1st, 2012 06:35
agrima (John Brown University (AR), Mathematics)
Passive voice episode: Consequently with passive episode the hack trespasses your digestive system, along with holds back for some valuable facts. An example may very well be: Some sort of keylogger which posts this suggestions provided by this victim to your nuller by way of a system(LAN as well as World-wide-web any(a)). "  

Please log in or register to add a comment.

0 votes

November 3rd, 2012 06:12
gaqruishta (Belmont Abbey College (NC), Electrical Engineering)
"Sorts of Passive attacksExamples connected with unaggressive assaults of which accumulate circle facts include the subsequent:·Community Research·Eavesdropping·Visitors Evaluation Common way of productive episodes can sometimes include these:· Masquerading ­ entails carrying out wildcat task by simply impersonating a legitimate"  

Please log in or register to add a comment.

0 votes

November 7th, 2012 09:34
ekaraj (Albright College (PA), Chemistry)
"There are 2 major families of problems: passive voice along with effective. ""Passive voice"" violence are that adversary faucets in to the technique and simply delays for a few info needed for being carried. ""Effective"" assaults are the types that opponent whitethorn release an active look for flaws inside your circle security measures. Info from any unaggressive tone-beginning can be utilised within an energetic invasion for you to commence a hostile rape. "  

Please log in or register to add a comment.

0 votes

November 7th, 2012 11:11
ekavaria (Angelo State University (TX), Chemistry)
In an energetic tone-beginning, your aggressor will try to avoid or maybe break into attached programs. This can be done via stealth, malware, viruses, or Trojan mounts. Active attacks admit tries to go around or even crack safeguard functions, flying insects detrimental signal, in order to take or adjust information.  

Please log in or register to add a comment.

0 votes

November 7th, 2012 12:21
eekbal (Randolph College (VA), Chemistry)
"Peaceful hazards will be the course of net problems requires searching for community selective information. Most of these inactive episodes can result in actual dynamic assaults or intrusions/penetrations in the organization's multilevel. Effective provocations come about as soon as enough multilevel information has become collected, the interloper will probably launch an actual tone-beginning against a new specific technique to either acquire complete command all over that will method or even enough command to be able to-bring about sure dangers for being noticed."

Please log in or register to add a comment.

Related questions
8 Answers
6 Answers
Answer
prindhorn (Massachusetts Institute of Technology (MIT) (MA), American literature)
6 Answers
Answer
paulina (City University of New York (NY), English literature)
6 Answers
Answer
fazal (Juniata College (PA), Technical writing)
Subjects