An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
Related Term(s): passive attack
Adapted from: IETF RFC 4949, NIST SP 800-63 Rev 1
An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
Related Term(s): passive attack
Adapted from: IETF RFC 4949, NIST SP 800-63 Rev 1