Categories
Literature and Communication The Physics of Everyday Life Botony Biostatistics Fundamentals of Information Technology Statistics and Economics Engineering Network Technologies and TCP/IP Business Administration Object Oriented Programming Operating System Law Law of Torts Computer Programming Advanced Physics Digital electronics Managerial Economics Pharmacy Business System Computer Fundamentals Generic Information System Analysis and Design Engineering Physics Medicine and Pharma On Docsity Languages Developmental Psychology Introduction to Business Job and Internships Management Statistics for Psychologists Finance Java Programming Methods in Psychology Biochemistry Political Science Psycology & Sociology Fundamentals of Operating Systems Business Law Accounting Physics Aerospace Engineering Advanced Computer Architecture Introduction to the Science and Engg Data Communication and Computer Networks Applied Physics Geochemistry Behavioural Science Computer science Consumer Behaviour Engineering Materials Biology & Chemistry Basic Electrical Engineering Mathematics Software Engineering History Computer Architecture Electronics and Communication Chemistry Biology History & Philosophy Effective Business Communication Financial Management Pyhsics and AstroPhysics Statistics Computer Graphics and Animation College Physics A United States Philosophy Civil procedure Business Management Questions on universities Security Analysis Agronomy Soil Mechanics and Foundations Analytical Chemistry Biological Systems Professional Communication for Pharmacists Internet and Java Programming Microeconomics American (United States) History Economics English Grammar Sociology Communication Skills Management Information Systems Economic Theory Criminal Law Human Resource Management Political sciences Admission tests Social Psychology Project Management Boilers and Welding General Pharmacy Fuzzy Intelligence Psychology

What is the difference between passive and active security threats?

0 votes

October 12th, 2012 10:01
in Data Communication and Computer Networks by sadayappan (Angelo State University (TX), Computer science)

What is the difference between passive and active security threats?

How can passive and active security threats differentiated?

6 Answers
0 votes

October 13th, 2012 10:29
beatryx (Kansas State University (KS), Databases)
"Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems."

Please log in or register to add a comment.

0 votes

November 1st, 2012 06:35
agrima (John Brown University (AR), Mathematics)
Passive voice episode: Consequently with passive episode the hack trespasses your digestive system, along with holds back for some valuable facts. An example may very well be: Some sort of keylogger which posts this suggestions provided by this victim to your nuller by way of a system(LAN as well as World-wide-web any(a)). "  

Please log in or register to add a comment.

0 votes

November 3rd, 2012 06:12
gaqruishta (Belmont Abbey College (NC), Electrical Engineering)
"Sorts of Passive attacksExamples connected with unaggressive assaults of which accumulate circle facts include the subsequent:·Community Research·Eavesdropping·Visitors Evaluation Common way of productive episodes can sometimes include these:· Masquerading ­ entails carrying out wildcat task by simply impersonating a legitimate"  

Please log in or register to add a comment.

0 votes

November 7th, 2012 09:34
ekaraj (Albright College (PA), Chemistry)
"There are 2 major families of problems: passive voice along with effective. ""Passive voice"" violence are that adversary faucets in to the technique and simply delays for a few info needed for being carried. ""Effective"" assaults are the types that opponent whitethorn release an active look for flaws inside your circle security measures. Info from any unaggressive tone-beginning can be utilised within an energetic invasion for you to commence a hostile rape. "  

Please log in or register to add a comment.

0 votes

November 7th, 2012 11:11
ekavaria (Angelo State University (TX), Chemistry)
In an energetic tone-beginning, your aggressor will try to avoid or maybe break into attached programs. This can be done via stealth, malware, viruses, or Trojan mounts. Active attacks admit tries to go around or even crack safeguard functions, flying insects detrimental signal, in order to take or adjust information.  

Please log in or register to add a comment.

0 votes

November 7th, 2012 12:21
eekbal (Randolph College (VA), Chemistry)
"Peaceful hazards will be the course of net problems requires searching for community selective information. Most of these inactive episodes can result in actual dynamic assaults or intrusions/penetrations in the organization's multilevel. Effective provocations come about as soon as enough multilevel information has become collected, the interloper will probably launch an actual tone-beginning against a new specific technique to either acquire complete command all over that will method or even enough command to be able to-bring about sure dangers for being noticed."

Please log in or register to add a comment.

Related questions
8 Answers
6 Answers
Answer
prindhorn (Massachusetts Institute of Technology (MIT) (MA), American literature)
6 Answers
Answer
paulina (City University of New York (NY), English literature)
6 Answers
Answer
fazal (Juniata College (PA), Technical writing)
Subjects