词条 | Piggyback attack |
释义 |
}}Piggyback attack is an active form of wiretapping. In fact the attacker gains access to a system via intervals of inactivity in another user’s legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".[1] In security, piggybacking is actually when someone tags along with another person who is authorized to gain entry into a restricted area, or pass something. Here we apply that concept to computer networks or workstations.[2] References1. ^{{cite book|author1=David Kim|author2=Michael G. Solomon|title=Fundamentals of Information Systems Security|date=2010|publisher=Jones & Bartlett Publishers|isbn=1449671640}} 2. ^IETF Internet Security Glossary Version 2, IDOCs that use this term SHOULD state a definition for it because the term could confuse international readers. Available at http://tools.ietf.org/html/rfc4949. 2 : Surveillance|Internet security |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。