The IT Law Wiki
Advertisement

Definition[]

Electronic piggybacking

can take place in an on-line computer system where individuals are using terminals and the computer system automatically verifies identification. When a terminal has been activated, the computer authorizes access, usually on the basis of a secret password, token, or other exchange of required identification and authentication information (protocol). Compromise of the computer can occur when a covert computer terminal is connected to the same line through the telephone switching equipment and used when the legitimate user is not using his or her terminal. The computer will not be able to differentiate between the two terminals, but senses only one terminal and one authorized user. Piggybacking can also be accomplished when the user signs off or a session terminates improperly, leaving the terminal or communications circuit in an active state or leaving the computer in a state where it assumes the user is still active. Call fowarding of the victim's telephone to the perpetrator's telephone is another means of piggybacking.[1]

References[]

Advertisement