Your browser does not support HTML5 local storage or you have disabled it. Some functionality on this site, including saving your privacy settings and offering you special discounts, uses local storage and may not work with local storage disabled. We recommend allowing the use of local storage in your browser. In some browsers, it is the same setting used for disabling cookies.

SSH Tectia

Threats and Attacks

Passive Attacks

Passive attacks are very hard to detect since they leave little or no trace of activity. In a passive attack, the attacker monitors and maybe records the data that passes by on the network. Eavesdropping and traffic analysis are types of passive attacks.

Active Attacks

In active attacks, the attacker takes an active part in the communication. The attacker modifies or deletes data belonging to the stream coming from a legitimate party, inserts extra data to the stream, or initiates direct connections. Active attacks are usually easier to detect but they also cause most harm. IP spoofing, TCP hijacking, replay, routing spoofing, and denial of service (DoS) are types of active attacks.