Answer:
Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it
4.5m questions
5.9m answers