Www.hsrd.research.va.gov

6 Sending an email message that looks as if it was sent from someone else. 7 Tapping into a communications line and latching on to a legitimate user to be carried into system. 8 Listening to private voice or data transmissions. 9 An attack that sends hundreds of email bombs per second to shut down a server (3 words). ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download