Glossary

Attack

Attacks describe prohibited actions and non-authorised acts which aim at destroying computing ressources, files or software. Essentially, there is a distinction between active (by distortion of the communication) and passive (by endangering the confidentiality) attacks.