| |
A passive attack is an information security event or incident based on monitoring or scanning communications, information flows or systems. In some cases, passive attacks are difficult to detect because they simply monitor as opposed to trying to break into a system. The following are illustrative examples.
TappingMonitoring unencrypted communications such as emails or telephone calls.EncryptionIntercepting encrypted information flows and trying to break the encryption.ScanningScanning a device connected to the internet for vulnerabilities such as open ports or a weak operating system version.Traffic AnalysisMonitoring internet traffic to build data such as who is visiting what website.
Information Security
This is the complete list of articles we have written about information security.
If you enjoyed this page, please consider bookmarking Simplicable.
© 2010-2023 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited.
View credits & copyrights or citation information for this page.
|