Active Attacks |
Passive Attacks |
Active attacks are based on the modification of the original message in some manner or creation of false message. |
In passive attacks, the attacker indulges in eavesdropping or monitoring of data transmission. |
The contents of original message are modified. |
There is no modification to the contents of an original message. |
The attacker needs to gain the physical control of the media. |
The attacker needs to observe the conversation. |
These attacks are relatively easier to detect. |
These attacks are harder to detect. |
These attacks cannot be prevented easily. |
These attacks can be prevented by encryption of data. |
There are four types of active attacks-
- Masquerade
- Replay
- Modification of message
- Denial of service
|
There are two types of passive attacks-
- Release of message content
- Traffic analysis
|
No comments:
Post a Comment