Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob's system. Using this technique. Michael can extract sensitive information from unencrypted data.
Identify the class of attack Michael has launched in the above scenario.
In apassive attack, the attacker observes or collects information without actively interacting with the target system. Michael's action of collecting data from Bob's system without any active interaction falls under this category. Passive attacks aim to extract sensitive information without altering the system's state or causing any disruption.
Denise
15 days agoJody
20 days agoFelix
23 days agoLisha
8 days agoDottie
29 days agoJerry
1 months agoMaurine
3 hours agoLeota
2 days agoCorinne
3 days agoTiffiny
10 days agoStarr
11 days agoMitzie
15 days agoTy
1 months ago