Thursday, July 18, 2019

Interception

Interception-



Interception attacks allow unauthorized users to access our   data, applications, or environments, and are primarily  an attack against confidentiality. Interception might  take the form of unauthorized file viewing or copying, eavesdropping on  phone conversations, or  reading  e-mail,  and  can  be  conducted  against data at rest or in motion. Properly executed, interception attacks can be very difficult to detect. 

No comments:

Post a Comment