The IT Law Wiki

Electronic piggybacking

32,080pages on
this wiki
Add New Page
Add New Page Talk0

Definition Edit

Electronic piggybacking

can take place in an on-line computer system where individuals are using terminals and the computer system automatically verifies identification. When a terminal has been activated, the computer authorizes access, usually on the basis of a secret password, token, or other exchange of required identification and authentication information (protocol). Compromise of the computer can occur when a covert computer terminal is connected to the same line through the telephone switching equipment and used when the legitimate user is not using his or her terminal. The computer will not be able to differentiate between the two terminals, but senses only one terminal and one authorized user. Piggybacking can also be accomplished when the user signs off or a session terminates improperly, leaving the terminal or communications circuit in an active state or leaving the computer in a state where it assumes the user is still active. Call fowarding of the victim's telephone to the perpetrator's telephone is another means of piggybacking.[1]

References Edit

  1. Computer Crime: Criminal Justice Resource Manual, at 11.

Also on Fandom

Random Wiki