Quick Reference

An attempt to overcome the security provisions of the network of a computer network. Attacks can be active attacks which alter the data stored on the network, for example deleting a critical file, or passive attacks which just read sensitive data passing through transmission lines.

Subjects: Computing.

Reference entries