Active Attack

A persistent security assault by someone trying to gain restricted access by altering data. There are multiple techniques, decryption for example, which can be used to lead the attack.

Get your copy of Information Governance World!

Scroll to Top