Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob's system. Using this technique. Michael can extract sensitive information from unencrypted data.
Identify the class of attack Michael has launched in the above scenario.
In apassive attack, the attacker observes or collects information without actively interacting with the target system. Michael's action of collecting data from Bob's system without any active interaction falls under this category. Passive attacks aim to extract sensitive information without altering the system's state or causing any disruption.
Currently there are no comments in this discussion, be the first to comment!