Active Attack is a kind of #Security Attack that modifies the data stream or create a false stream to the target and attempts to gain unauthorised access to computer systems. It is rather hard to prevent, but there are some measures available to detect and recover from the destruction. Example of Active Attack including Interruption#, Modification#, and Fabrication#.
Active Attack
-
Security Attack
Security Attack is an action that attempt to compromise the information security and/or disrupt the normal flow of information, that is from source to destination. There are several methods on attempting it: Interruption#, Interception#, Modification# and Fabrication#. Based on its invasiveness, Security Attack could be divided into two categories: Passive Attack# and Active Attack#.
-
Passive Attack
Passive Attack is a kind of #Security Attack involves eavesdropping or monitoring the network without disturbing the system utilities. It is rather difficult to detect, but there are some prevention methods available. Interception# is such attack. A Passive Attack could be developed into an Active Attack.
-
Interception
Interception is a form of #Security Attack aims at eavesdropping or monitoring or simply gaining access to the network flow or the system itself. It undermines the confidentiality# of the system. Traffic analysis# and Man-In-The-Middle Attack (MITM)# are one of the methods of interception, and the information acquired by this method could be exposed to the public or furthered materialised using one of the Active Attack.