- This type of threats, includes of information system fraud and computer sabotage.
- In an active attack a hacker tries to get the valuable information by using his abilities rather than depending on the stupidity of the victim.
An example could be: Using Brute force to crack the password of a system.
- While for this type of threats, includes of system faults, as well as natural disasters, such as earthquakes, floods, fires, and hurricanes.
- in passive attack a hacker intrudes your system, and waits for some valuable information.
An example could be: A keylogger which sends the input given by the victim to a hacker via a network(LAN or Internet whatever).