Jump to content

Piggyback attack

From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

A Piggyback attack is an active form of wiretapping where the attacker gains access to a system via intervals of inactivity in another user's legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".[1]

In security, piggybacking refers to when someone tags along with another person who is authorized to gain entry into a restricted area the term is applied to computer networks in this context.[2]

References

  1. ^ David Kim; Michael G. Solomon (2010). Fundamentals of Information Systems Security. Jones & Bartlett Publishers. ISBN 978-1449671648.
  2. ^ IETF Internet Security Glossary Version 2, IDOCs that use this term SHOULD state a definition for it because the term could confuse international readers. Available at http://tools.ietf.org/html/rfc4949.