请输入您要查询的百科知识:

 

词条 Piggyback attack
释义

  1. References

{{Multiple issues|{{Underlinked|date=August 2016}}{{Orphan|date=August 2016}}
}}Piggyback attack is an active form of wiretapping. In fact the attacker gains access to a system via intervals of inactivity in another user’s legitimate connection. It is also called a “between the line attack” or "piggyback-entry wiretapping".[1]

In security, piggybacking is actually when someone tags along with another person who is authorized to gain entry into a restricted area, or pass something. Here we apply that concept to computer networks or workstations.[2]

References

1. ^{{cite book|author1=David Kim|author2=Michael G. Solomon|title=Fundamentals of Information Systems Security|date=2010|publisher=Jones & Bartlett Publishers|isbn=1449671640}}
2. ^IETF Internet Security Glossary Version 2, IDOCs that use this term SHOULD state a definition for it because the term could confuse international readers. Available at http://tools.ietf.org/html/rfc4949.

2 : Surveillance|Internet security

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/21 0:43:27