active threat
threat of a deliberate unauthorized change to the state of the systemEXAMPLE: Examples of security-relevant active threats may include modification of messages, replay of messages, and insertion of spurious messages, masquerading as an authorized entity and denial of service.
Application Area:
Automatic Vehicle and Equipment Identification (AVI/AEI)
Strukturální kategorie:
Fundamental Concepts and Foundations,
Verification and Security
