Show Summary Details

Quick Reference

An attempt to overcome the security provisions of the network of a computer network. Attacks can be active attacks which alter the data stored on the network, for example deleting a critical file, or passive attacks which just read sensitive data passing through transmission lines.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.