440:
20:
134:
79:
65:. A study showed that the majority of undercover agents attempting to pass through checkpoints, bring banned items on planes, or board planes without tickets were successful. Piggybacking was revealed as one of the methods that were used in order to enter off-limits areas.
47:. It can be either electronic or physical. The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act.
391:
409:
195:
or the rules of the facility, or is tricked into believing the piggybacker is authorized, and agreeably allows the piggybacked to tag along
481:
43:, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain
165:
A user fails to properly log off their computer, allowing an unauthorized user to "piggyback" on the authorized user's session.
313:
286:
256:
185:
Surreptitiously following an individual authorized to enter a location, giving the appearance of being legitimately escorted
141:
54:
the consent of the authorized person, the term tailgating is also used. "Tailgating" implies no consent (similar to a car
474:
188:
Joining a large crowd authorized to enter, and pretending to be a member of the crowd that is largely unchecked
61:
Piggybacking came to the public's attention particularly in 1999, when a series of weaknesses were exposed in
210:
205:
Gaining access through alternative entrances like rear or side doors, such as those found in parking lots
505:
467:
58:
another vehicle on a road), while "piggybacking" usually implies consent of the authorized person.
455:
330:
145:
100:
276:
246:
8:
500:
44:
410:"CROA case shows why piggybacking isn't the answer for consumers shouldering bad credit"
50:
To describe the act of an unauthorized person who follows someone to a restricted area
372:
309:
282:
252:
199:
364:
62:
303:
451:
356:
368:
494:
376:
222:
19:
181:
Piggybackers have various methods of breaching security. These may include:
104:
447:
392:"How a man used social engineering to trick a FTSE-listed financial firm"
169:
55:
24:
93:
439:
89:
32:
278:
Information
Security Management Handbook on CD-ROM, 2006 Edition
209:
Piggybacking can be regarded as one of the simpler forms of
202:
badges or cards to seamlessly integrate into the environment
192:
191:
Finding an authorized person who either disregards the
240:
238:
244:
235:
492:
305:Security+ Guide to Network Security Fundamentals
389:
248:Physical Security Strategy and Process Playbook
475:
331:"Inspectors walk through US airport security"
270:
268:
301:
482:
468:
357:"HCI for Cybersecurity, Privacy and Trust"
295:
265:
245:John Kingsley-Hefty (25 September 2013).
168:Using authorized shared or common log in
16:Gaining entry by following another person
18:
354:
493:
328:
274:
434:
128:
72:
13:
251:. Elsevier Science. pp. 85–.
14:
517:
361:Lecture Notes in Computer Science
438:
132:
77:
402:
390:Siobhan Chapman (2009-05-11).
383:
348:
322:
275:Krause, Micki (6 April 2006).
92:format but may read better as
1:
329:Kettle, Martin (1999-12-03).
228:
124:
454:. You can help Knowledge by
355:Moallem, Abbas, ed. (2021).
302:Mark Ciampa (27 July 2012).
7:
281:. CRC Press. p. 3800.
216:
176:
10:
522:
433:
68:
369:10.1007/978-3-030-77392-2
172:to gain access to systems
414:Federal Trade Commission
101:converting this article
450:-related article is a
28:
23:No Tailgating sign at
22:
308:. Cengage Learning.
198:Donning counterfeit
146:adding missing items
211:social engineering
144:; you can help by
103:, if appropriate.
29:
506:Terminology stubs
463:
462:
315:978-1-111-64012-5
288:978-0-8493-8585-8
258:978-0-12-417237-1
162:
161:
122:
121:
513:
484:
477:
470:
442:
435:
425:
424:
422:
421:
406:
400:
399:
387:
381:
380:
352:
346:
345:
343:
342:
326:
320:
319:
299:
293:
292:
272:
263:
262:
242:
157:
154:
136:
135:
129:
117:
114:
108:
99:You can help by
81:
80:
73:
63:airport security
521:
520:
516:
515:
514:
512:
511:
510:
491:
490:
489:
488:
431:
429:
428:
419:
417:
408:
407:
403:
396:Computerworlduk
388:
384:
353:
349:
340:
338:
327:
323:
316:
300:
296:
289:
273:
266:
259:
243:
236:
231:
219:
179:
158:
152:
149:
133:
127:
118:
112:
109:
98:
82:
78:
71:
17:
12:
11:
5:
519:
509:
508:
503:
487:
486:
479:
472:
464:
461:
460:
443:
427:
426:
401:
382:
347:
321:
314:
294:
287:
264:
257:
233:
232:
230:
227:
226:
225:
218:
215:
207:
206:
203:
200:identification
196:
189:
186:
178:
175:
174:
173:
166:
160:
159:
139:
137:
126:
123:
120:
119:
85:
83:
76:
70:
67:
15:
9:
6:
4:
3:
2:
518:
507:
504:
502:
499:
498:
496:
485:
480:
478:
473:
471:
466:
465:
459:
457:
453:
449:
444:
441:
437:
436:
432:
415:
411:
405:
397:
393:
386:
378:
374:
370:
366:
362:
358:
351:
336:
332:
325:
317:
311:
307:
306:
298:
290:
284:
280:
279:
271:
269:
260:
254:
250:
249:
241:
239:
234:
224:
223:Gate crashing
221:
220:
214:
212:
204:
201:
197:
194:
190:
187:
184:
183:
182:
171:
167:
164:
163:
156:
153:November 2018
147:
143:
140:This list is
138:
131:
130:
116:
113:November 2018
107:is available.
106:
102:
96:
95:
91:
86:This article
84:
75:
74:
66:
64:
59:
57:
53:
48:
46:
42:
39:, similar to
38:
34:
26:
21:
456:expanding it
445:
430:
418:. Retrieved
416:. 2020-03-09
413:
404:
395:
385:
360:
350:
339:. Retrieved
335:The Guardian
334:
324:
304:
297:
277:
247:
208:
180:
150:
110:
105:Editing help
87:
60:
51:
49:
40:
37:piggybacking
36:
30:
448:terminology
170:credentials
501:Definition
495:Categories
420:2020-11-21
341:2010-05-22
229:References
142:incomplete
125:Electronic
56:tailgating
45:checkpoint
41:tailgating
25:Apple Inc.
377:0302-9743
337:. London
217:See also
177:Physical
33:security
69:Methods
52:without
375:
312:
285:
255:
88:is in
27:office
446:This
94:prose
452:stub
373:ISSN
310:ISBN
283:ISBN
253:ISBN
90:list
365:doi
193:law
148:.
31:In
497::
412:.
394:.
371:.
363:.
359:.
333:.
267:^
237:^
213:.
35:,
483:e
476:t
469:v
458:.
423:.
398:.
379:.
367::
344:.
318:.
291:.
261:.
155:)
151:(
115:)
111:(
97:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.