Professional Documents
Culture Documents
35. Involves the passive capture of data and retransmission to produce an unauthorized
effect (Replay – Masquerade – Modification of message) which is an attack on
(Confidentiality – Integrity – Availability )
36. Snooping and traffic analysis (spoofing) are attack on (Confidentiality – Integrity –
Availability – All)