Piggyback attack
From HandWiki
Revision as of 10:53, 9 May 2022 by imported>WikiEditor (simplify)
Short description: Form of wiretapping
A Piggyback attack is an active form of wiretapping where the attacker gains access to a system via intervals of inactivity in another user's legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".[1]
In security, piggybacking refers to when someone tags along with another person who is authorized to gain entry into a restricted area the term is applied to computer networks in this context.[2]
References
- ↑ David Kim; Michael G. Solomon (2010). Fundamentals of Information Systems Security. Jones & Bartlett Publishers. ISBN 978-1449671648.
- ↑ IETF Internet Security Glossary Version 2, IDOCs that use this term SHOULD state a definition for it because the term could confuse international readers. Available at http://tools.ietf.org/html/rfc4949.
Original source: https://en.wikipedia.org/wiki/Piggyback attack.
Read more |