home/dictionary/active attack

active attack

nouncandidate·updated May 9, 2026

An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.

Framework senses

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Lexicon1 senseview framework →
§1
An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
NISTIR 7298: Glossary of Key Information Security Terms, Revision 22 sensesview framework →
§1
An attack that alters a system or data.
§2 · sense_2_pending_review
An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.
CNSSI-4009 (Glossary of Information Assurance Terms)1 senseview framework →
§1
An attack that alters a system or data.
NIST SP 800-631 senseview framework →
§1
An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.