A persistent security assault by someone trying to gain restricted access by altering data. There are multiple techniques, decryption for example, which can be used to lead the attack.
An attack which results in an unauthorized state change, such as the manipulation of files, or the adding of unauthorized files.
Attacks which modify the target system or message, i.e. attacks which violate the integrity of the system or message are examples of an active attack. Another example in this category is an attack on the availability of a system or service, a so-called denial-of-service (DoS) attack.
An attack in which the attacker must create or modify information.
A situation when an impostor intentionally modifies, simulates or reproduces a biometric sample and submits this sample into the system in an attempt to initiate a false match.
An attack on a system which either injects false information into the system, or corrupts information already present on the system.
The attacker who can alter the messages to his advantage
Any network-based attack other than simple eavesdropping (i.e., a passive attack).