TappingMonitoring unencrypted communications such as emails or telephone calls.
EncryptionIntercepting encrypted information flows and trying to break the encryption.
ScanningScanning a device connected to the internet for vulnerabilities such as open ports or a weak operating system version.
Traffic AnalysisMonitoring internet traffic to build data such as who is visiting what website.
|Overview: Passive Attack|
|Definition||An information security attack that monitors or scans communications, information flows or systems.|
|Related Concepts||Active AttackAdvanced Persistent ThreatInformation Security|