Professional Documents
Culture Documents
(minimum of 75 words)
= In active attacks, the attacker intercepts the connection and attempts to modify
the message's content. The attacker modifies actual information, and the victim
gets notified about the attack. The damage done by active attacks can be
harmful to the system and its resources. In passive attacks, the attacker
observes the messages, then copies and saves them, and can use them for
malicious purposes Information remains unchanged, so victims do not get
informed about the attack.
2. Identify the Security Attacks and Breaches in Network System “give at least one
(1) and elaborate your answer”? (minimum of 100 words)