Back

active threat

1. Any threat of a deliberate unauthorized change to the state of a data processing system. Note: For example, an active threat that would result in modification of messages, insertion of spurious messages, masquerade, or denial of service [2382-pt.8].
2. The threat of a deliberate unauthorized change to the state of the system. Note: Examples of security-relevant active threats may be: modification of messages, replay of messages, insertion of spurious messages, masquerading as an authorized entity and denial of service [7498-2].