Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

The team liked the information you provided about authenticated and unauthentica

ID: 3916319 • Letter: T

Question

The team liked the information you provided about authenticated and unauthenticated attacks, but they are still a little confused about the difference between active and passive attacks and how they relate to the authenticated attacks previously described. Take this opportunity to describe how active and passive attacks work and the authenticated and unauthenticated attacks tie together with them.
Provide descriptions of active and passive attacks.
The team liked the information you provided about authenticated and unauthenticated attacks, but they are still a little confused about the difference between active and passive attacks and how they relate to the authenticated attacks previously described. Take this opportunity to describe how active and passive attacks work and the authenticated and unauthenticated attacks tie together with them.
Provide descriptions of active and passive attacks.

Provide descriptions of active and passive attacks.
Provide descriptions of active and passive attacks.

Explanation / Answer

Answer: Active attacks – Active attacks attempts to change the system setting or affect operations. In short, intruder breach the system and modifies the system resource management or system settings as per their benefits. In this victim gets informed about attack. It is threat to availability and Integrity. This attack always causes harm to the system. Active attacks are in the form of modification, fabrication and Interruption. Examples of active attacks – Denial of service ( DOS attack), phishing attack.

In contrast with authenticated attack, Active attacks also required knowledge about target system so as to modify its setting or perform fabrication.

Passive attack - Passive attack attempts to only read the sensitive information from the system not any modification or alteration of the system. In short, intruder breach the system and keeps eye on the system and gets the sensitive information of organization which might be harmful for any organization. In this victim is not informed about attack. It is possible threat to confidentiality of the information. This attack does not harm the system. Examples – Traffic Analysis, Tapping and Scanning.

In contrast with unauthenticated attacks, passive attacks also do not require any prior knowledge about the system because here intruder is only interested in watching information not in alteration of the system.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote