FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these best describes a passive attack?
A
Someone attacks a network with malware.
B
Someone from inside an organisation uses the network to steal information.
C
Someone monitors data travelling on the network to steal information.
D
None of the above
Explanation: 

Detailed explanation-1: -Eavesdropping. Eavesdropping occurs when an attacker intercepts sensitive information by listening to phone calls or reading unencrypted messages exchanged in a communication medium. Although eavesdropping is similar to snooping, snooping is limited to gaining access to data during transmission.

Detailed explanation-2: -Passive attacks are a type of cyberattack that involves the use of malicious software, such as spyware, malware, and other malicious programs. Spyware is a type of software that is installed on a system or network to collect information about the user or system without their knowledge.

Detailed explanation-3: -Confidentiality is the protection of transmitted data from passive attacks. With respect to the content of a data transmission, several levels of protection can be identified. The broadest service protects all user data transmitted between two users over a period of time.

Detailed explanation-4: -In an active attack, Victim gets informed about the attack. While in a passive attack, Victim does not get informed about the attack. In an active attack, System resources can be changed. While in passive attack, System resources are not changing.

Detailed explanation-5: -A passive attack may be a system attack that doesn’t end in a change to the system in any way. During this attack, the attacker doesn’t get to communicate with the system. Instead, he/she passively monitors or records the info passing over the channel to and from the system.

There is 1 question to complete.