<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Telecommunications and Network Security on Bill Brown:Thoughts and Reference Material Online</title><link>https://www.billbrown.info/series/telecommunications-and-network-security/</link><description>Recent content in Telecommunications and Network Security on Bill Brown:Thoughts and Reference Material Online</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>BillBrown.info</copyright><lastBuildDate>Sun, 17 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.billbrown.info/series/telecommunications-and-network-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Active vs Passive Security Threats Explained</title><link>https://www.billbrown.info/post/active-vs-passive-security-threats-explained/</link><pubDate>Sun, 17 May 2026 00:00:00 +0000</pubDate><guid>https://www.billbrown.info/post/active-vs-passive-security-threats-explained/</guid><description>
&lt;h2 id="active-vs-passive-security-threats-explained"&gt;Active vs Passive Security Threats Explained&lt;/h2&gt;
&lt;p&gt;A threat as described by Workman, Phelps &amp;amp; Gathegi (2013) in relation to information security, view a threat to the potential of a security breach in relation to a vulnerability. Vulnerabilities as described by Workman, Phelps &amp;amp; Gathegi (2013), is an artifact of a system in which the security of the system is breached. During the attack, vulnerability is exploited in a can be passive or active.&lt;/p&gt;</description></item></channel></rss>