Directive Blogs
Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Attack Vectors: Active and Passive
Attack vectors may sound like a term out of a Sci-Fi film, but you’ve definitely run into them more often than you think.
In this Micro Training, we’ll define what an attack vector is, along with the active or passive roles that they may take.
Quick Tips
- To better guard sessions from hijacking, be sure to log out of web applications securely.
- To protect against eavesdropping, consider encrypting data to ensure that it cannot be easily understood if intercepted.