Compare active attacks and passive attacks.
While active attacks try to change data and system resources, passive attacks monitor the system to gain information and discover vulnerabilities.