Active attacks include altering message contents, masquerading as someone else, denial of ______, and planting ______.
Active attacks include altering message contents, masquerading as someone else, denial of ______, and planting ______.
1