Active Attack

An active attack is an attack on the authentication protocol where the Attacker transmits data to theClaimant, Credential Service Provider, Verifier, or Relaying Party. Examples of active attacks include man-in-the …

Passive Attack

A Passive Attack is an actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to …