You are on page 1of 1

1. Differentiate Passive Attacks and Active Attacks?

(minimum of 75 words)

= In active attacks, the attacker intercepts the connection and attempts to modify
the message's content. The attacker modifies actual information, and the victim
gets notified about the attack. The damage done by active attacks can be
harmful to the system and its resources. In passive attacks, the attacker
observes the messages, then copies and saves them, and can use them for
malicious purposes Information remains unchanged, so victims do not get
informed about the attack.

2. Identify the Security Attacks and Breaches in Network System “give at least one
(1) and elaborate your answer”? (minimum of 100 words)

= Security attacks attempt to gain unauthorized access to information resources


or services, or to cause harm or damage to information systems. Breaches in
network systems occur when an outsider discovers a way to circumvent your
cyber security and gain access to your network. An example of a breach in a
network system is Integrity involves maintaining the consistency, accuracy, and
trustworthiness of data over its entire lifecycle. To maintain integrity, data must
not be changed in transit and steps must be taken to ensure that data cannot be
altered by an unauthorized person or program.

You might also like