active threat

threat of a deliberate unauthorized change to the state of the system
EXAMPLE: Examples of security-relevant active threats may include modification of messages, replay of messages, and insertion of spurious messages, masquerading as an authorized entity and denial of service.


Application Area: Automatic Vehicle and Equipment Identification (AVI/AEI)



Filtering by Type

Filtering by Application Area