Active Attack

February 8, 2018

How Can We Help?

You are here:
< Back

An attack that alters a system or data.
SOURCE: CNSSI-4009

An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.
SOURCE: SP 800-63