The type of attack you're describing, which attempts to alter system resources or affect their operation, is referred to as an **Active Attack**.
In contrast:
- **Passive Attacks** involve intercepting and monitoring communications without altering the data.
- **Inside Attacks** generally refer to threats originating from within an organization, often by insiders with access to systems.
- **Outside Attacks** come from external adversaries


