answersLogoWhite

0

passive threat of a data or information processing system, a threat of disclosureof information without changing the state of the system.For example of a passive threat is one that could result in the recoveryof sensitive information through the unauthorized interception of a data transmission.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What is the biggest threat to computer security?

Hackers


Is a computer virus considered a security risk?

Yes, most of the computer virus have security threat to the infected computer. If your computer has been infected with virus, you should remove it quickly.


What is network threat?

A network threat is a security breach within a computer system. Examples off this is Denial-of-Service, Unauthorized Access or Confidentiality Breaches.


What is passive graphics in brief?

What is passive graphics in brief? In Passive Computer


How many types of Computer virus?

20 Common Types of Viruses Affecting Your Computer. When we talk about computer security, the virus is the leading threat. It can destroy a single program or the whole computer system instead


What is terrorist threat?

National threat to the security


What do you mean by interactive and passive computer graphics. also explain how does an interactive computer graphics works?

passive and interactive computer graphics example


Is social engineering a passive threat?

No, social engineering is an active threat where attackers manipulate people into divulging confidential information or taking certain actions that compromise security. It involves psychological manipulation to exploit human behavior and could lead to serious consequences if successful.


What topology is a passive topology?

Ring topology is the passive topology in computer networks


What actors and actresses appeared in Security Threat - 2003?

The cast of Security Threat - 2003 includes: Ray Landry as Narrator


What is passive attack?

A passive attack is when an unauthorized party monitors or captures data transmissions between two or more entities without altering the data. These attacks are difficult to detect because they do not disrupt the communication flow, making them a serious security threat. Examples include eavesdropping on network traffic or intercepting data transmissions.


Where can you download the rogue AntiVirus Pro?

Rogue security software is a form of computer malware that deceives or misleads users into paying for the fake or simulated removal of malware. Rogue security software has become a growing and serious security threat in desktop computing.STAY AWAY FROM THIS.