A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

4 Examples of a Passive Attack

 , November 25, 2016
A passive attack is an information security event or incident based on monitoring or scanning communications, information flows or systems. In some cases, passive attacks are difficult to detect because they simply monitor as opposed to trying to break into a system. The following are illustrative examples.

Tapping

Monitoring unencrypted communications such as emails or telephone calls.

Encryption

Intercepting encrypted information flows and trying to break the encryption.

Scanning

Scanning a device connected to the internet for vulnerabilities such as open ports or a weak operating system version.

Traffic Analysis

Monitoring internet traffic to build data such as who is visiting what website.
Overview: Passive Attack
TypeInformation Security
DefinitionAn information security attack that monitors or scans communications, information flows or systems.
Related ConceptsActive Attack
Advanced Persistent Threat
Information Security

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Data Breach
Data Remanence
Data Security
Deep Magic
Defense In Depth
Defensive Computing
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Fatigue
Proof Of Work
Sandbox
Security Controls
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map