Knowledge

Piggybacking (security)

Source 📝

440: 20: 134: 79: 65:. A study showed that the majority of undercover agents attempting to pass through checkpoints, bring banned items on planes, or board planes without tickets were successful. Piggybacking was revealed as one of the methods that were used in order to enter off-limits areas. 47:. It can be either electronic or physical. The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act. 391: 409: 195:
or the rules of the facility, or is tricked into believing the piggybacker is authorized, and agreeably allows the piggybacked to tag along
481: 43:, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain 165:
A user fails to properly log off their computer, allowing an unauthorized user to "piggyback" on the authorized user's session.
313: 286: 256: 185:
Surreptitiously following an individual authorized to enter a location, giving the appearance of being legitimately escorted
141: 54:
the consent of the authorized person, the term tailgating is also used. "Tailgating" implies no consent (similar to a car
474: 188:
Joining a large crowd authorized to enter, and pretending to be a member of the crowd that is largely unchecked
61:
Piggybacking came to the public's attention particularly in 1999, when a series of weaknesses were exposed in
210: 205:
Gaining access through alternative entrances like rear or side doors, such as those found in parking lots
505: 467: 58:
another vehicle on a road), while "piggybacking" usually implies consent of the authorized person.
455: 330: 145: 100: 276: 246: 8: 500: 44: 410:"CROA case shows why piggybacking isn't the answer for consumers shouldering bad credit" 50:
To describe the act of an unauthorized person who follows someone to a restricted area
372: 309: 282: 252: 199: 364: 62: 303: 451: 356: 368: 494: 376: 222: 19: 181:
Piggybackers have various methods of breaching security. These may include:
104: 447: 392:"How a man used social engineering to trick a FTSE-listed financial firm" 169: 55: 24: 93: 439: 89: 32: 278:
Information Security Management Handbook on CD-ROM, 2006 Edition
209:
Piggybacking can be regarded as one of the simpler forms of
202:
badges or cards to seamlessly integrate into the environment
192: 191:
Finding an authorized person who either disregards the
240: 238: 244: 235: 492: 305:Security+ Guide to Network Security Fundamentals 389: 248:Physical Security Strategy and Process Playbook 475: 331:"Inspectors walk through US airport security" 270: 268: 301: 482: 468: 357:"HCI for Cybersecurity, Privacy and Trust" 295: 265: 245:John Kingsley-Hefty (25 September 2013). 168:Using authorized shared or common log in 16:Gaining entry by following another person 18: 354: 493: 328: 274: 434: 128: 72: 13: 251:. Elsevier Science. pp. 85–. 14: 517: 361:Lecture Notes in Computer Science 438: 132: 77: 402: 390:Siobhan Chapman (2009-05-11). 383: 348: 322: 275:Krause, Micki (6 April 2006). 92:format but may read better as 1: 329:Kettle, Martin (1999-12-03). 228: 124: 454:. You can help Knowledge by 355:Moallem, Abbas, ed. (2021). 302:Mark Ciampa (27 July 2012). 7: 281:. CRC Press. p. 3800. 216: 176: 10: 522: 433: 68: 369:10.1007/978-3-030-77392-2 172:to gain access to systems 414:Federal Trade Commission 101:converting this article 450:-related article is a 28: 23:No Tailgating sign at 22: 308:. Cengage Learning. 198:Donning counterfeit 146:adding missing items 211:social engineering 144:; you can help by 103:, if appropriate. 29: 506:Terminology stubs 463: 462: 315:978-1-111-64012-5 288:978-0-8493-8585-8 258:978-0-12-417237-1 162: 161: 122: 121: 513: 484: 477: 470: 442: 435: 425: 424: 422: 421: 406: 400: 399: 387: 381: 380: 352: 346: 345: 343: 342: 326: 320: 319: 299: 293: 292: 272: 263: 262: 242: 157: 154: 136: 135: 129: 117: 114: 108: 99:You can help by 81: 80: 73: 63:airport security 521: 520: 516: 515: 514: 512: 511: 510: 491: 490: 489: 488: 431: 429: 428: 419: 417: 408: 407: 403: 396:Computerworlduk 388: 384: 353: 349: 340: 338: 327: 323: 316: 300: 296: 289: 273: 266: 259: 243: 236: 231: 219: 179: 158: 152: 149: 133: 127: 118: 112: 109: 98: 82: 78: 71: 17: 12: 11: 5: 519: 509: 508: 503: 487: 486: 479: 472: 464: 461: 460: 443: 427: 426: 401: 382: 347: 321: 314: 294: 287: 264: 257: 233: 232: 230: 227: 226: 225: 218: 215: 207: 206: 203: 200:identification 196: 189: 186: 178: 175: 174: 173: 166: 160: 159: 139: 137: 126: 123: 120: 119: 85: 83: 76: 70: 67: 15: 9: 6: 4: 3: 2: 518: 507: 504: 502: 499: 498: 496: 485: 480: 478: 473: 471: 466: 465: 459: 457: 453: 449: 444: 441: 437: 436: 432: 415: 411: 405: 397: 393: 386: 378: 374: 370: 366: 362: 358: 351: 336: 332: 325: 317: 311: 307: 306: 298: 290: 284: 280: 279: 271: 269: 260: 254: 250: 249: 241: 239: 234: 224: 223:Gate crashing 221: 220: 214: 212: 204: 201: 197: 194: 190: 187: 184: 183: 182: 171: 167: 164: 163: 156: 153:November 2018 147: 143: 140:This list is 138: 131: 130: 116: 113:November 2018 107:is available. 106: 102: 96: 95: 91: 86:This article 84: 75: 74: 66: 64: 59: 57: 53: 48: 46: 42: 39:, similar to 38: 34: 26: 21: 456:expanding it 445: 430: 418:. Retrieved 416:. 2020-03-09 413: 404: 395: 385: 360: 350: 339:. Retrieved 335:The Guardian 334: 324: 304: 297: 277: 247: 208: 180: 150: 110: 105:Editing help 87: 60: 51: 49: 40: 37:piggybacking 36: 30: 448:terminology 170:credentials 501:Definition 495:Categories 420:2020-11-21 341:2010-05-22 229:References 142:incomplete 125:Electronic 56:tailgating 45:checkpoint 41:tailgating 25:Apple Inc. 377:0302-9743 337:. London 217:See also 177:Physical 33:security 69:Methods 52:without 375:  312:  285:  255:  88:is in 27:office 446:This 94:prose 452:stub 373:ISSN 310:ISBN 283:ISBN 253:ISBN 90:list 365:doi 193:law 148:. 31:In 497:: 412:. 394:. 371:. 363:. 359:. 333:. 267:^ 237:^ 213:. 35:, 483:e 476:t 469:v 458:. 423:. 398:. 379:. 367:: 344:. 318:. 291:. 261:. 155:) 151:( 115:) 111:( 97:.

Index


Apple Inc.
security
checkpoint
tailgating
airport security
list
prose
converting this article
Editing help
incomplete
adding missing items
credentials
law
identification
social engineering
Gate crashing


Physical Security Strategy and Process Playbook
ISBN
978-0-12-417237-1


Information Security Management Handbook on CD-ROM, 2006 Edition
ISBN
978-0-8493-8585-8
Security+ Guide to Network Security Fundamentals
ISBN
978-1-111-64012-5

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.