| |
A passive attack is an information security event or incident based on monitoring or scanning communications, information flows or systems. In some cases, passive attacks are difficult to detect because they simply monitor as opposed to trying to break into a system. The following are illustrative examples.
TappingMonitoring unencrypted communications such as emails or telephone calls.EncryptionIntercepting encrypted information flows and trying to break the encryption.ScanningScanning a device connected to the internet for vulnerabilities such as open ports or a weak operating system version.Traffic AnalysisMonitoring internet traffic to build data such as who is visiting what website.|
Type | | Definition | An information security attack that monitors or scans communications, information flows or systems. | Related Concepts | | Next: Advanced Persistent Threat
More about cybersecurity:
If you enjoyed this page, please consider bookmarking Simplicable.
© 2010-2023 Simplicable. All Rights Reserved. Reproduction of materials found on this site, in any form, without explicit permission is prohibited.
View credits & copyrights or citation information for this page.
|