Piggyback attack

From HandWiki
Revision as of 10:53, 9 May 2022 by imported>WikiEditor (simplify)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Short description: Form of wiretapping

A Piggyback attack is an active form of wiretapping where the attacker gains access to a system via intervals of inactivity in another user's legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".[1]

In security, piggybacking refers to when someone tags along with another person who is authorized to gain entry into a restricted area the term is applied to computer networks in this context.[2]

References

  1. David Kim; Michael G. Solomon (2010). Fundamentals of Information Systems Security. Jones & Bartlett Publishers. ISBN 978-1449671648. 
  2. IETF Internet Security Glossary Version 2, IDOCs that use this term SHOULD state a definition for it because the term could confuse international readers. Available at http://tools.ietf.org/html/rfc4949.