ACTIVE ATTACKS

It involves some modification of data stream and can be sub divided into four categories

  1. Masquerade – It takes place when one entity pretends to be another entity
  2. Replay – It involves passive capture of data unit and its subsequent retransmission to produce unauthorized effect.
  3. Denial of service – The denial of service prevents or inhibits the normal use or management of communication facilities
  4. Modification of message – It simply means that some portion of legitimate message is altered or the message are delayed or reordered to produce unauthorized effect.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s