In an active attack, the threat actor takes action to change or manipulate data on a target system or en route to the target. Common types of active attacks include masquerade attacks where the attacker pretends to be an authorized user, session hijacking attacks where the attacker steals a user's session information, message modification attacks where the attacker intercepts and alters messages, and denial-of-service (DoS) attacks which overwhelm system resources with traffic to cause disruption. Passive attacks involve monitoring networks without changing data in preparation for potential future active attacks.