Skip to content
SynAc
Term

active attack

An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man-in- the middle (MitM), impersonation, and session hijacking.

Senses

Sense 1

An attack on a secure communication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Examples of active attacks include man-in- the middle (MitM), impersonation, and session hijacking.

References
  • NIST CSRC GlossaryJan 05, 2026
    active attack
    https://csrc.nist.gov/glossary/term/active_attack
    NIST states most site information is public information and may be distributed or copied, except material marked as copyrighted; attribution requested. Verify per-document markings before quoting.
    Source: NIST CSRC Glossary (csrc.nist.gov).
Sense 2

An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.

References
  • NICCS (CISA) Cybersecurity VocabularyJan 06, 2026
    NICCS glossary export (CSV)
    https://niccs.cisa.gov/rest/vocab/export-csv
    NICCS is a CISA (DHS) program. Individual glossary entries include a "From" attribution (e.g., CNSSI 4009, NIST SPs, NICE Framework). Treat "From" values as upstream provenance and verify before quoting large portions of text.
    Source: NICCS (CISA) Cybersecurity Vocabulary (niccs.cisa.gov).
(I)

See: secondary definition under "attack".

References
  • IETF RFC 4949 (Internet Security Glossary)Jan 06, 2026
    RFC 4949 — Internet Security Glossary (Version 2)
    https://www.rfc-editor.org/rfc/rfc4949.txt
    RFC 4949 is published by the IETF Trust and marked as "Distribution of this memo is unlimited". Verify IETF Trust copyright/licensing terms for reuse.
    Source: IETF RFC 4949 (rfc-editor.org).