To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Piggybacking (security)

From Wikipedia, the free encyclopedia

No Tailgating sign at Apple Inc. office

In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint.[1] It can be either electronic or physical.[2] The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act.[1]

To describe the act of an unauthorized person who follows someone to a restricted area without the consent of the authorized person, the term tailgating is also used. "Tailgating" implies no consent (similar to a car tailgating another vehicle on a road), while "piggybacking" usually implies consent of the authorized person.[3]

Piggybacking came to the public's attention particularly in 1999, when a series of weaknesses were exposed in airport security. A study showed that the majority of undercover agents attempting to pass through checkpoints, bring banned items on planes, or board planes without tickets were successful. Piggybacking was revealed as one of the methods that were used in order to enter off-limits areas.[4]

YouTube Encyclopedic

  • 1/3
    Views:
    12 473
    39 820
    218 110
  • Piggybacking or Tailgating
  • Employee Security Awareness Training
  • NolaCon 2019 D 07 Breaking Into Your Building A Hackers Guide to Unauthorized Physical Access Brent

Transcription

Methods

Electronic

  • A user fails to properly log off their computer, allowing an unauthorized user to "piggyback" on the authorized user's session.[2]
  • Using authorized shared or common log in credentials to gain access to systems

Physical

Piggybackers have various methods of breaching security. These may include:

  • Surreptitiously following an individual authorized to enter a location, giving the appearance of being legitimately escorted
  • Joining a large crowd authorized to enter, and pretending to be a member of the crowd that is largely unchecked
  • Finding an authorized person who either disregards the law or the rules of the facility, or is tricked into believing the piggybacker is authorized, and agreeably allows the piggybacked to tag along
  • Donning counterfeit identification badges or cards to seamlessly integrate into the environment
  • Gaining access through alternative entrances like rear or side doors, such as those found in parking lots[5]

Piggybacking can be regarded as one of the simpler forms of social engineering.[6][7]

See also

References

  1. ^ a b John Kingsley-Hefty (25 September 2013). Physical Security Strategy and Process Playbook. Elsevier Science. pp. 85–. ISBN 978-0-12-417237-1.
  2. ^ a b Krause, Micki (6 April 2006). Information Security Management Handbook on CD-ROM, 2006 Edition. CRC Press. p. 3800. ISBN 978-0-8493-8585-8.
  3. ^ Mark Ciampa (27 July 2012). Security+ Guide to Network Security Fundamentals. Cengage Learning. ISBN 978-1-111-64012-5.
  4. ^ Kettle, Martin (1999-12-03). "Inspectors walk through US airport security". The Guardian. London. Retrieved 2010-05-22.
  5. ^ Moallem, Abbas, ed. (2021). "HCI for Cybersecurity, Privacy and Trust". Lecture Notes in Computer Science. doi:10.1007/978-3-030-77392-2. ISSN 0302-9743.
  6. ^ Siobhan Chapman (2009-05-11). "How a man used social engineering to trick a FTSE-listed financial firm". Computerworlduk.
  7. ^ "CROA case shows why piggybacking isn't the answer for consumers shouldering bad credit". Federal Trade Commission. 2020-03-09. Retrieved 2020-11-21.


This page was last edited on 19 April 2024, at 00:57
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.