These type of attacks monitor traffic and then send back into the system some very similar traffic. The intention is to upset the system into breaking or giving unauthorised access.
Cyber Essentials Scheme Cyber Resilience Cyber Risk Firewall & Network Security Industry & Updates Phishing & Security Awareness Training Technical Vulnerability Management