1 | 4 | ||||||||||||||||||||
3 | |||||||||||||||||||||
2 | |||||||||||||||||||||
1. A form of attack where an unauthorized party intercepts and monitors communication on a network.
2. An attack where an attacker pretends to be a legitimate user or device on a network to gain unauthorized access.
3. An attack where an attacker physically taps into a network cable to intercept data passing through.
4. Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply.