Passive attacks - Eavesdropping
Does the attacker need to continuously monitor the system to gather the data for eavesdropping?
Which of the following is an example of an eavesdropping attack?
Traffic analysis is an example for