Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The team liked the information you provided about authenticated and unauthentica

ID: 3713549 • Letter: T

Question

The team liked the information you provided about authenticated and unauthenticated attacks, but they are still a little confused about the difference between active and passive attacks and how they relate to the authenticated attacks previously described. Take this opportunity to describe how active and passive attacks work and the authenticated and unauthenticated attacks tie together with them. Address the following and add your responses to your final Key Assignment:

A description of active attacks.

A description of passive attacks.

3 examples of each (6 total) but ensure that 3 are Windows based and 3 are UNIX based.

Include a discussion talking about how authenticated and unauthenticated attacks are used during passive and active attacks.

Add the discussion about the attack methods and examples to the section titled:

Explanation / Answer

Active Attacks are internet security attacks which are meant to hack the data that is being transmitted in a network.The hackers main purpose in active attack is to alter the data is being sent in a network.

A Passive attack is a network monitoring attack during which only the network and the system is monitored for some vulnerabilities. The passive are not meant to alter the data which being tranmitted,these attacks are only used for monitoring.

Examples of active attacks:

Example of Passive Attacks:

Authenticated attacks target the authentication process that a website uses to verify the identity of the users.

Unauthenticated attacks involves monitoring a network to find out vulnerabilites in a network.this attack is done by imposing as an authorised user.

Active attacks are a type of authenticated attack,since active attacks involve targeting the data that is being transferred,the active attack takes place using the authenticated attack.The imposter first hacks the verification process of a website and then hacks the data that is being transmitted using the active attacks.

Passive Attacks are directly related to unauthenticated attacks since the unauthenticated attacks aims at finding the vulnerable networks which the hacker finds out using the passive attacks.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote