Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The motivation for such an attack:

  1. It is possible to reduce trust and discredits the network security performing such an attack because any user will have the possibility to get previously permission data.
  2. This attack makes it possible to get private data secured by-laws that may cause the penalty for the company responsible for the network.