active attack
nounid
1432·updated May 9, 2026candidate
An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.
polysemousMWE
Classifications
Entity Type
Threat92%llm-generatedllm:claude-haiku-4-5
Sensitivity
unclassified
Information Class
unclassified
Variants
- plural
- active attacks
- possessive
- active attack's
- pluralpossessive
- active attacks'
Framework definitions
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Lexicon1 senseview framework →
- §1
- An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
- §1
- An attack that alters a system or data.
- §2 · sense_2_pending_review
- An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.
- §1
- An attack that alters a system or data.
- §1
- An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relying Party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking.
Outgoing relationships
- related
- →passive attacknoun
Incoming relationships
- related
- ←passive attacknoun
- ←attacknoun