![](https://2.bp.blogspot.com/-t7DRgVszlN4/XAv1eyek9qI/AAAAAAAAHF8/4PghHtfWVr40uZT0UXFcYtueg27onsV2wCLcBGAs/s1600/active%2Battack.jpg)
2. In a passive attack, the attacker intercepts the transmitted information with the intention of reading and analyzing the information, however, in this scenario the attacker does not modify the information. A passive attack is difficult to detect. Many time passive attack is initiated to launch an active attack. To protect against a passive attack encryption is usually put in place. Both passive and active attacks can also considered as the Man-in-the-Middle attack.
![](https://1.bp.blogspot.com/-JUVe16O_62s/XAv2P3YHj0I/AAAAAAAAHGE/nLq3zB-w2-IVW78Qd7An0TcH7Vq4JvimQCLcBGAs/s640/Passive%2BAttacks1.jpg)
0 comments:
Post a Comment