Eavesdropping |
A form of attack where an unauthorized party intercepts and monitors communication on a network. |
Impersonation |
An attack where an attacker pretends to be a legitimate user or device on a network to gain unauthorized access. |
Physical System Attacks |
Attacks that exploit vulnerabilities in a physical system, such as tampering with hardware or interrupting power supply. |
Physical Tapping |
An attack where an attacker physically taps into a network cable to intercept data passing through. |
Tampering |
An attack where an attacker alters data or devices in a network to disrupt operations or gain unauthorized access. |