Michael is an attacker who aims to hack Bob's system. He started collecting data without any active interaction with Bob's system. Using this technique. Michael can extract sensitive information from unencrypted data.
Identify the class of attack Michael has launched in the above scenario.
In apassive attack, the attacker observes or collects information without actively interacting with the target system. Michael's action of collecting data from Bob's system without any active interaction falls under this category. Passive attacks aim to extract sensitive information without altering the system's state or causing any disruption.
Deeann
1 day agoTegan
6 days agoHector
11 days agoAnna
17 days agoRosann
22 days agoClemencia
27 days agoVilma
2 months agoValentin
2 months agoSalome
2 months agoSalome
2 months agoVon
2 months agoJamie
3 months agoJuliana
3 months ago