Passive attack: Monitoring the message during transmission.
Eg: Interception Active attack: It involves the modification of data stream or creation of false data stream. E.g.: Fabrication, Modification, and Interruption
ARP packets can be forged to send data to the attacker’s machine