Request New Subject
Home
Information Technology Engineering (IT)
Information and Cyber Security (ICS)
Q. attack is when original data is modified and malicious data is inserted (Solved)
1. masquerade
2. replay(rewrite)
3. modification
4. traffic analysis
b. replay(rewrite)
Related Topics
→ Internet of Things (IoT)
→ Human Computer Interaction (HCI)
→ Social Media Analytics (SMA)
Subscribe Now
Get All Updates & News
Subscribe