Active Attack

An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relaying Party. Examples of active attacks include man-in-the middle, impersonation, and session hijacking. 

Get Certified Get Ahead

See CNSSI 4009-2015 (NIST SP 800-63-2) for more information. 

An attack on the authentication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man-in-the-middle (MitM), impersonation, and session hijacking. 

See NIST SP 800-63-3 under Active Attack for more information. 

Share this Post